{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T21:12:46Z","timestamp":1764364366950,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_14","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"166-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9148-7616","authenticated-orcid":false,"given":"Kai","family":"Peng","sequence":"first","affiliation":[]},{"given":"Lixin","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4879-9803","authenticated-orcid":false,"given":"Xiaolong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"14_CR1","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, vol. 17. James P. Anderson Company, Pennsylvania (1980)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 2, 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2808691","volume":"48","author":"A Milenkoski","year":"2015","unstructured":"Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., Payne, B.D.: Evaluating computer intrusion detection systems: a survey of common practices. ACM Comput. Surv. (CSUR) 48(1), 1\u201341 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","volume":"83","author":"T Wang","year":"2018","unstructured":"Wang, T., et al.: Fog-based storage technology to fight with cyber threat. Future Gener. Comput. Syst. 83, 208\u2013218 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"14_CR5","first-page":"23","volume":"18","author":"K Peng","year":"2017","unstructured":"Peng, K., Lin, R.H., Huang, B.B., Zou, H., Yang, F.C.: Link importance evaluation of data center network based on maximum flow. J. Internet Technol. 18(1), 23\u201331 (2017)","journal-title":"J. Internet Technol."},{"key":"14_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.031","author":"T Wang","year":"2017","unstructured":"Wang, T., et al.: Data collection from WSNs to the cloud based on mobile fog elements. Future Gener. Comput. Syst. (2017). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.07.031","journal-title":"Future Gener. Comput. Syst."},{"key":"14_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049","author":"T Wang","year":"2018","unstructured":"Wang, T., Zhang, G.X., Bhuiyan, M.Z.A., Liu, A.F., Jia, W., Xie, M.: A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener. Comput. Syst. (2018). \nhttps:\/\/doi.org\/10.1016\/j.future.2018.05.049","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu, X., Zhu, X., Wu, G.Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97\u2013107 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2018.1700303","volume":"56","author":"T Wang","year":"2018","unstructured":"Wang, T., Bhuiyan, M.Z.A., Wang, G.J., Rahman, A., Wu, J., Cao, J.N.: Big data reduction for smart city\u2019s critical infrastructural health monitoring. IEEE Commun. Mag. 56(3), 128\u2013133 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR10","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: 7th USENIX. USENIX Security Symposium, pp. 79\u201393 (1998)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Huang, Q.J.: Clustering approach based on mini batch Kmeans for intrusion detection system over big data. IEEE Access 6, 11897\u201311906 (2018)","journal-title":"IEEE Access"},{"key":"14_CR12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4680867","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Zheng, L.X., Wang, S.G., Huang, C., Lin, T.: Intrusion detection system based on decision tree over big data in fog environment. Wirel. Commun. Mob. Comput. (2018). \nhttps:\/\/doi.org\/10.1155\/2018\/4680867","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"14_CR13","unstructured":"Halko, N., Martinsson, P.G., Tropp, J.A.: Finding Structure with Randomness: Stochastic Algorithms for Constructing Approximate Matrix Decompositions. \nhttp:\/\/resolver.caltech.edu\/CaltechAUTHORS:20111012-111324407"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/089976699300016728","volume":"11","author":"ME Tipping","year":"1999","unstructured":"Tipping, M.E., Bishop, C.M.: Mixtures of probabilistic principal component analyzers. Neural Comput. 11(2), 443\u2013482 (1999)","journal-title":"Neural Comput."},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.acha.2010.02.003","volume":"30","author":"PG Martinsson","year":"2011","unstructured":"Martinsson, P.G., Rokhlin, V., Tygert, M.: A randomized algorithm for the decomposition of matrices. Appl. Comput. Harmonic Anal. 30(1), 47\u201368 (2011)","journal-title":"Appl. Comput. Harmonic Anal."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: An efficient data clustering method for very large databases. In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data (SIGMOD 1996), pp. 103\u2013114. ACM, New York (1996)","DOI":"10.1145\/233269.233324"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03610927408827101","volume":"3","author":"T Calinski","year":"1974","unstructured":"Calinski, T., Harabasz, J.: A dendrite method for cluster analysis. Commun. Stat.-Theory Methods 3(1), 1\u201327 (1974)","journal-title":"Commun. Stat.-Theory Methods"},{"key":"14_CR18","unstructured":"http:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"14_CR19","unstructured":"KDDCUP99. \nhttp:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"14_CR20","unstructured":"Scikit-learn. \nhttp:\/\/scikit-learn.org\/stable\/index.html"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:15:47Z","timestamp":1544174147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}