Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1109/tsmc.2025.3525956
Secure resource management (SRM) within a cloud computing environment is a critical yet infrequently studied research topic. This paper provides a comprehensive survey and comparative performance evaluation of potential cyber threat countermeasure strategies that address security challenges during cloud workload execution and resource management. Cybersecurity is explored specifically in the context of cloud resource management, with an emphasis on identifying the associated challenges. The cyber threat countermeasure methods are categorized into three classes: defensive strategies, mitigating strategies, and hybrid strategies. The existing countermeasure strategies belonging to each class are thoroughly discussed and compared. In addition to conceptual and theoretical analysis, the leading countermeasure strategies within these categories are implemented on a common platform and examined using two real-world virtual machine (VM) data traces. Based on this comprehensive study and performance evaluation, the paper discusses the trade-offs among these countermeasure strategies and their utility, providing imperative concluding remarks on the holistic study of cloud cyber threat countermeasures and secure resource management. Furthermore, the study suggests future methodologies that could effectively address the emerging challenges of secure cloud resource management.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/tsmc.2025.3525956
- OA Status
- green
- Cited By
- 5
- References
- 61
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4406878785
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4406878785Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/tsmc.2025.3525956Digital Object Identifier
- Title
-
Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-AnalysisWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-27Full publication date if available
- Authors
-
Deepika Saxena, Smruti Rekha Swain, Jatinder Kumar, Sakshi Patni, Kishu Gupta, Ashutosh Kumar Singh, V. LindenstruthList of authors in order
- Landing page
-
https://doi.org/10.1109/tsmc.2025.3525956Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2502.03149Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Meta-analysis, Computer security, Business, Medicine, Operating system, Internal medicineTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
5Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 5Per-year citation counts (last 5 years)
- References (count)
-
61Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4406878785 |
|---|---|
| doi | https://doi.org/10.1109/tsmc.2025.3525956 |
| ids.doi | https://doi.org/10.1109/tsmc.2025.3525956 |
| ids.openalex | https://openalex.org/W4406878785 |
| fwci | 48.31836624 |
| type | article |
| title | Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis |
| biblio.issue | 4 |
| biblio.volume | 55 |
| biblio.last_page | 2912 |
| biblio.first_page | 2897 |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9520999789237976 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7792935371398926 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5516626238822937 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C95190672 |
| concepts[2].level | 2 |
| concepts[2].score | 0.43968087434768677 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q815382 |
| concepts[2].display_name | Meta-analysis |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.412568062543869 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C144133560 |
| concepts[4].level | 0 |
| concepts[4].score | 0.3279007375240326 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[4].display_name | Business |
| concepts[5].id | https://openalex.org/C71924100 |
| concepts[5].level | 0 |
| concepts[5].score | 0.08322429656982422 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[5].display_name | Medicine |
| concepts[6].id | https://openalex.org/C111919701 |
| concepts[6].level | 1 |
| concepts[6].score | 0.07225301861763 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[6].display_name | Operating system |
| concepts[7].id | https://openalex.org/C126322002 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11180 |
| concepts[7].display_name | Internal medicine |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.7792935371398926 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5516626238822937 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/meta-analysis |
| keywords[2].score | 0.43968087434768677 |
| keywords[2].display_name | Meta-analysis |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.412568062543869 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/business |
| keywords[4].score | 0.3279007375240326 |
| keywords[4].display_name | Business |
| keywords[5].id | https://openalex.org/keywords/medicine |
| keywords[5].score | 0.08322429656982422 |
| keywords[5].display_name | Medicine |
| keywords[6].id | https://openalex.org/keywords/operating-system |
| keywords[6].score | 0.07225301861763 |
| keywords[6].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1109/tsmc.2025.3525956 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S4210209078 |
| locations[0].source.issn | 2168-2216, 2168-2232 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2168-2216 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IEEE Transactions on Systems Man and Cybernetics Systems |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Transactions on Systems, Man, and Cybernetics: Systems |
| locations[0].landing_page_url | https://doi.org/10.1109/tsmc.2025.3525956 |
| locations[1].id | pmh:oai:arXiv.org:2502.03149 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | https://arxiv.org/pdf/2502.03149 |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://arxiv.org/abs/2502.03149 |
| indexed_in | arxiv, crossref |
| authorships[0].author.id | https://openalex.org/A5033305584 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-6654-5535 |
| authorships[0].author.display_name | Deepika Saxena |
| authorships[0].countries | JP |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I141591182 |
| authorships[0].affiliations[0].raw_affiliation_string | Division of Information Systems, University of Aizu, Aizuwakamatsu, Japan |
| authorships[0].institutions[0].id | https://openalex.org/I141591182 |
| authorships[0].institutions[0].ror | https://ror.org/02pg0e883 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I141591182 |
| authorships[0].institutions[0].country_code | JP |
| authorships[0].institutions[0].display_name | University of Aizu |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Deepika Saxena |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Division of Information Systems, University of Aizu, Aizuwakamatsu, Japan |
| authorships[1].author.id | https://openalex.org/A5004023504 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-0643-4267 |
| authorships[1].author.display_name | Smruti Rekha Swain |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I105094715 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Applications, National Institute of Technology Kurukshetra, Kurukshetra, India |
| authorships[1].institutions[0].id | https://openalex.org/I105094715 |
| authorships[1].institutions[0].ror | https://ror.org/04909p852 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I105094715 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | National Institute of Technology Kurukshetra |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Smruti Rekha Swain |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Applications, National Institute of Technology Kurukshetra, Kurukshetra, India |
| authorships[2].author.id | https://openalex.org/A5040137763 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9319-3408 |
| authorships[2].author.display_name | Jatinder Kumar |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, University of Economics and Human Sciences, Warsaw, Poland |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jatinder Kumar |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, University of Economics and Human Sciences, Warsaw, Poland |
| authorships[3].author.id | https://openalex.org/A5037726558 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-2447-1611 |
| authorships[3].author.display_name | Sakshi Patni |
| authorships[3].countries | KR |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I12832649 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computing, Gachon University, Seongnam, South Korea |
| authorships[3].institutions[0].id | https://openalex.org/I12832649 |
| authorships[3].institutions[0].ror | https://ror.org/03ryywt80 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I12832649 |
| authorships[3].institutions[0].country_code | KR |
| authorships[3].institutions[0].display_name | Gachon University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sakshi Patni |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computing, Gachon University, Seongnam, South Korea |
| authorships[4].author.id | https://openalex.org/A5068703420 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-1451-4745 |
| authorships[4].author.display_name | Kishu Gupta |
| authorships[4].countries | TW |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I142974352 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan |
| authorships[4].institutions[0].id | https://openalex.org/I142974352 |
| authorships[4].institutions[0].ror | https://ror.org/00mjawt10 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I142974352 |
| authorships[4].institutions[0].country_code | TW |
| authorships[4].institutions[0].display_name | National Sun Yat-sen University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Kishu Gupta |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan |
| authorships[5].author.id | https://openalex.org/A5013082893 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-8053-5050 |
| authorships[5].author.display_name | Ashutosh Kumar Singh |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer Science, University of Economics and Human Sciences, Warsaw, Poland |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Ashutosh Kumar Singh |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Computer Science, University of Economics and Human Sciences, Warsaw, Poland |
| authorships[6].author.id | https://openalex.org/A5053660490 |
| authorships[6].author.orcid | https://orcid.org/0009-0006-7301-988X |
| authorships[6].author.display_name | V. Lindenstruth |
| authorships[6].countries | DE |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I114090438 |
| authorships[6].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Goethe University, Frankfurt, Germany |
| authorships[6].institutions[0].id | https://openalex.org/I114090438 |
| authorships[6].institutions[0].ror | https://ror.org/04cvxnb49 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I114090438 |
| authorships[6].institutions[0].country_code | DE |
| authorships[6].institutions[0].display_name | Goethe University Frankfurt |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Volker Lindenstruth |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Department of Computer Science and Engineering, Goethe University, Frankfurt, Germany |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2502.03149 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9520999789237976 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4244478748, https://openalex.org/W3150465815, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W1997222214, https://openalex.org/W2560439919 |
| cited_by_count | 5 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 5 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2502.03149 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2502.03149 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2502.03149 |
| primary_location.id | doi:10.1109/tsmc.2025.3525956 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S4210209078 |
| primary_location.source.issn | 2168-2216, 2168-2232 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2168-2216 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IEEE Transactions on Systems Man and Cybernetics Systems |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Transactions on Systems, Man, and Cybernetics: Systems |
| primary_location.landing_page_url | https://doi.org/10.1109/tsmc.2025.3525956 |
| publication_date | 2025-01-27 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2135359801, https://openalex.org/W4213418679, https://openalex.org/W4295789345, https://openalex.org/W4390692353, https://openalex.org/W4395069564, https://openalex.org/W2900947057, https://openalex.org/W2900996896, https://openalex.org/W4318586089, https://openalex.org/W2616747538, https://openalex.org/W4360979501, https://openalex.org/W2525570818, https://openalex.org/W2026532973, https://openalex.org/W4383752436, https://openalex.org/W4387350693, https://openalex.org/W4297799206, https://openalex.org/W3012496643, https://openalex.org/W4226062437, https://openalex.org/W4391454464, https://openalex.org/W4391019581, https://openalex.org/W2786073798, https://openalex.org/W2894873043, https://openalex.org/W3155559132, https://openalex.org/W2771316858, https://openalex.org/W2758353532, https://openalex.org/W4392523637, https://openalex.org/W2336467084, https://openalex.org/W2946517659, https://openalex.org/W1970863753, https://openalex.org/W2209602157, https://openalex.org/W2218186169, https://openalex.org/W2782078190, https://openalex.org/W2171863291, https://openalex.org/W2024540116, https://openalex.org/W2104182023, https://openalex.org/W3093737865, https://openalex.org/W2123808272, https://openalex.org/W2978484667, https://openalex.org/W6637822523, https://openalex.org/W3185051527, https://openalex.org/W2921318726, https://openalex.org/W3107184047, https://openalex.org/W6839528729, https://openalex.org/W3095265082, https://openalex.org/W6713012638, https://openalex.org/W2644225658, https://openalex.org/W2771838132, https://openalex.org/W2923033513, https://openalex.org/W3048922006, https://openalex.org/W4315481265, https://openalex.org/W3169434696, https://openalex.org/W2795127435, https://openalex.org/W2799627099, https://openalex.org/W3093414280, https://openalex.org/W2738679187, https://openalex.org/W2789525712, https://openalex.org/W2919803975, https://openalex.org/W4200405021, https://openalex.org/W4200376313, https://openalex.org/W2586677657, https://openalex.org/W2498207281, https://openalex.org/W3107242135 |
| referenced_works_count | 61 |
| abstract_inverted_index.a | 5, 10, 20, 110 |
| abstract_inverted_index.In | 93 |
| abstract_inverted_index.an | 56 |
| abstract_inverted_index.in | 48 |
| abstract_inverted_index.is | 9, 45 |
| abstract_inverted_index.of | 27, 51, 151, 173 |
| abstract_inverted_index.on | 58, 109, 124, 147 |
| abstract_inverted_index.to | 85, 95 |
| abstract_inverted_index.The | 63, 80 |
| abstract_inverted_index.and | 23, 41, 77, 91, 97, 113, 128, 140, 156 |
| abstract_inverted_index.are | 68, 88, 107 |
| abstract_inverted_index.the | 49, 60, 100, 131, 134, 148, 161, 170 |
| abstract_inverted_index.two | 116 |
| abstract_inverted_index.yet | 12 |
| abstract_inverted_index.(VM) | 120 |
| abstract_inverted_index.This | 17 |
| abstract_inverted_index.data | 121 |
| abstract_inverted_index.each | 86 |
| abstract_inverted_index.into | 70 |
| abstract_inverted_index.that | 33, 166 |
| abstract_inverted_index.this | 125 |
| abstract_inverted_index.with | 55 |
| abstract_inverted_index.(SRM) | 3 |
| abstract_inverted_index.Based | 123 |
| abstract_inverted_index.among | 136 |
| abstract_inverted_index.class | 87 |
| abstract_inverted_index.cloud | 6, 38, 52, 152, 175 |
| abstract_inverted_index.could | 167 |
| abstract_inverted_index.cyber | 29, 64, 153 |
| abstract_inverted_index.paper | 18, 132 |
| abstract_inverted_index.study | 127, 150, 162 |
| abstract_inverted_index.their | 141 |
| abstract_inverted_index.these | 105, 137 |
| abstract_inverted_index.three | 71 |
| abstract_inverted_index.using | 115 |
| abstract_inverted_index.Secure | 0 |
| abstract_inverted_index.common | 111 |
| abstract_inverted_index.during | 37 |
| abstract_inverted_index.future | 164 |
| abstract_inverted_index.hybrid | 78 |
| abstract_inverted_index.secure | 157, 174 |
| abstract_inverted_index.survey | 22 |
| abstract_inverted_index.threat | 30, 65, 154 |
| abstract_inverted_index.topic. | 16 |
| abstract_inverted_index.within | 4, 104 |
| abstract_inverted_index.address | 34, 169 |
| abstract_inverted_index.context | 50 |
| abstract_inverted_index.leading | 101 |
| abstract_inverted_index.machine | 119 |
| abstract_inverted_index.methods | 67 |
| abstract_inverted_index.remarks | 146 |
| abstract_inverted_index.studied | 14 |
| abstract_inverted_index.traces. | 122 |
| abstract_inverted_index.virtual | 118 |
| abstract_inverted_index.addition | 94 |
| abstract_inverted_index.classes: | 72 |
| abstract_inverted_index.critical | 11 |
| abstract_inverted_index.emerging | 171 |
| abstract_inverted_index.emphasis | 57 |
| abstract_inverted_index.examined | 114 |
| abstract_inverted_index.existing | 81 |
| abstract_inverted_index.explored | 46 |
| abstract_inverted_index.holistic | 149 |
| abstract_inverted_index.platform | 112 |
| abstract_inverted_index.provides | 19 |
| abstract_inverted_index.research | 15 |
| abstract_inverted_index.resource | 1, 42, 53, 158, 176 |
| abstract_inverted_index.security | 35 |
| abstract_inverted_index.suggests | 163 |
| abstract_inverted_index.utility, | 142 |
| abstract_inverted_index.workload | 39 |
| abstract_inverted_index.analysis, | 99 |
| abstract_inverted_index.belonging | 84 |
| abstract_inverted_index.compared. | 92 |
| abstract_inverted_index.computing | 7 |
| abstract_inverted_index.defensive | 73 |
| abstract_inverted_index.discussed | 90 |
| abstract_inverted_index.discusses | 133 |
| abstract_inverted_index.execution | 40 |
| abstract_inverted_index.potential | 28 |
| abstract_inverted_index.providing | 143 |
| abstract_inverted_index.associated | 61 |
| abstract_inverted_index.categories | 106 |
| abstract_inverted_index.challenges | 36, 172 |
| abstract_inverted_index.conceptual | 96 |
| abstract_inverted_index.concluding | 145 |
| abstract_inverted_index.evaluation | 26 |
| abstract_inverted_index.imperative | 144 |
| abstract_inverted_index.management | 2 |
| abstract_inverted_index.mitigating | 75 |
| abstract_inverted_index.real-world | 117 |
| abstract_inverted_index.strategies | 32, 83, 103, 139 |
| abstract_inverted_index.thoroughly | 89 |
| abstract_inverted_index.trade-offs | 135 |
| abstract_inverted_index.categorized | 69 |
| abstract_inverted_index.challenges. | 62 |
| abstract_inverted_index.comparative | 24 |
| abstract_inverted_index.effectively | 168 |
| abstract_inverted_index.environment | 8 |
| abstract_inverted_index.evaluation, | 130 |
| abstract_inverted_index.identifying | 59 |
| abstract_inverted_index.implemented | 108 |
| abstract_inverted_index.management, | 54 |
| abstract_inverted_index.management. | 43, 159, 177 |
| abstract_inverted_index.performance | 25, 129 |
| abstract_inverted_index.strategies, | 74, 76 |
| abstract_inverted_index.strategies. | 79 |
| abstract_inverted_index.theoretical | 98 |
| abstract_inverted_index.Furthermore, | 160 |
| abstract_inverted_index.infrequently | 13 |
| abstract_inverted_index.specifically | 47 |
| abstract_inverted_index.Cybersecurity | 44 |
| abstract_inverted_index.comprehensive | 21, 126 |
| abstract_inverted_index.methodologies | 165 |
| abstract_inverted_index.countermeasure | 31, 66, 82, 102, 138 |
| abstract_inverted_index.countermeasures | 155 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 97 |
| countries_distinct_count | 5 |
| institutions_distinct_count | 7 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/8 |
| sustainable_development_goals[0].score | 0.5199999809265137 |
| sustainable_development_goals[0].display_name | Decent work and economic growth |
| citation_normalized_percentile.value | 0.99239989 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |