{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:35:55Z","timestamp":1767972955952,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030312763","type":"print"},{"value":"9783030312770","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31277-0_15","type":"book-chapter","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T12:02:53Z","timestamp":1568376173000},"page":"235-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm"],"prefix":"10.1007","author":[{"given":"Zouhair","family":"Chiba","sequence":"first","affiliation":[]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Moussaid","sequence":"additional","affiliation":[]},{"given":"Amina","family":"El Omri","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Rida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,14]]},"reference":[{"key":"15_CR1","unstructured":"Verizon, State of the Market: Enterprise Cloud. http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_state-of-the-marketenterprise-cloud-2016_en_xg.pdf . Accessed 17 Feb 2019"},{"key":"15_CR2","unstructured":"Hogan, M., Sokol, A.: NIST cloud computing standards roadmap. Version 2. NIST Cloud Computing Standards Roadmap Working Group. NIST Special Publications 500-291, NIST, Gaithersburg, MD, pp. 1\u2013113 (2013)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","volume":"125","author":"PR Kumar","year":"2018","unstructured":"Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691\u2013697 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.ins.2018.06.072","volume":"501","author":"W Wang","year":"2018","unstructured":"Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543\u2013557 (2018)","journal-title":"Inf. Sci."},{"issue":"C","key":"15_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.procs.2018.01.095","volume":"127","author":"M Idhammad","year":"2018","unstructured":"Idhammad, M., Afdel, K., Belouch, M.: Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput. Sci. 127(C), 35\u201341 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"15_CR6","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105. Curran Associates, Inc., Lake Tahoe (2012)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-1-4842-0328-6","volume-title":"Genetic Algorithms in Java Basics","author":"L Jacobson","year":"2015","unstructured":"Jacobson, L., Kanbe, B.: Genetic Algorithms in Java Basics, pp. 143\u2013144. Apress, New York (2015)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Mehmood, Y., Shibli, M.A., Kanwal, A., Masood, R.: Distributed intrusion detection system using mobile agents in cloud computing environment. In:\u00a02015 Conference on Information Assurance and Cyber Security (CIACS),\u00a0pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/CIACS.2015.7395559"},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.29196\/jub.v26i1.351","volume":"26","author":"SM Mehibs","year":"2018","unstructured":"Mehibs, S.M., Hashim, S.H.: Proposed network intrusion detection system\u200e in cloud environment based on back\u200e propagation neural network. J. Univ. Babylon Pure Appl. Sci. 26(1), 29\u201340 (2018)","journal-title":"J. Univ. Babylon Pure Appl. Sci."},{"issue":"4","key":"15_CR10","first-page":"179","volume":"1","author":"AS Saljoughi","year":"2018","unstructured":"Saljoughi, A.S., Mehrvarz, M., Mirvaziri, H.: Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms. Emerg. Sci. J. 1(4), 179\u2013191 (2018)","journal-title":"Emerg. Sci. J."},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.icte.2018.01.014","volume":"5","author":"B Hajimirzaei","year":"2018","unstructured":"Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Expr. 5, 56\u201359 (2018)","journal-title":"ICT Expr."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-981-10-4741-1_35","volume-title":"Emerging Research in Computing, Information, Communication and Applications","author":"P Ghosh","year":"2018","unstructured":"Ghosh, P., Jha, S., Dutta, R., Phadikar, S.: Intrusion detection system based on BCS-GA in cloud environment. In: Shetty, N.R., Patnaik, L.M., Prasad, N.H., Nalini, N. (eds.) ERCICA 2016, pp. 393\u2013403. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-4741-1_35"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.01.023","volume":"75","author":"Z Chiba","year":"2018","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36\u201358 (2018)","journal-title":"Comput. Secur."},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.56801\/rebicte.v3i.28","volume":"3","author":"BA Tama","year":"2017","unstructured":"Tama, B.A., Rhee, K.: Attack classification analysis of IoT network via deep learning approach. Res. Briefs Inf. Commun. Technol. Evol. (ReBICTE) 3, 1\u20139 (2017)","journal-title":"Res. Briefs Inf. Commun. Technol. Evol. (ReBICTE)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Ahmim, A., Maglaras, L., Ferrag, M.A., Derdour, M., Janicke, H.: A novel hierarchical intrusion detection system based on decision tree and rules-based models.\u00a0arXiv preprint arXiv:1812.09059 (2018)","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Musbau, D.A, Alhassan, J.K.: Ensemble learning approach for the enhancement of performance of intrusion detection system. In: International Conference on Information and Communication Technology and its Applications (ICTA 2018), pp. 1\u20138. CEUR-WS, Minna (2018)","DOI":"10.26634\/jit.8.1.15717"},{"key":"15_CR17","unstructured":"The NSL-KDD data set. http:\/\/nsl.cs.unb.ca\/NSL-KDD . Accessed 17 Feb 2019"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Gharib, A., Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: An evaluation framework for intrusion detection dataset. In:\u00a02016 International Conference on Information Science and Security (ICISS),\u00a0pp. 1\u20136. IEEE, Pattaya (2016)","DOI":"10.1109\/ICISSEC.2016.7885840"},{"issue":"1","key":"15_CR19","first-page":"3698","volume":"10","author":"P Sharma","year":"2018","unstructured":"Sharma, P., Sengupta, J., Suri, P.K.: WLI-FCM and artificial neural network based cloud intrusion detection system. Int. J. Adv. Network. Appl. 10(1), 3698\u20133703 (2018)","journal-title":"Int. J. Adv. Network. Appl."},{"issue":"6","key":"15_CR20","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s00521-015-1964-2","volume":"27","author":"BM Aslahi-Shahri","year":"2016","unstructured":"Aslahi-Shahri, B.M., et al.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669\u20131676 (2016)","journal-title":"Neural Comput. Appl."},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.eswa.2017.09.013","volume":"92","author":"AH Hamamoto","year":"2018","unstructured":"Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abr\u00e3o, T., Proen\u00e7a Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390\u2013402 (2018)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31277-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T07:09:06Z","timestamp":1695193746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31277-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030312763","9783030312770"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31277-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakech","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.91","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.68","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}