{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:21:54Z","timestamp":1743060114696,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030510404"},{"type":"electronic","value":"9783030510411"}],"license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-51041-1_52","type":"book-chapter","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T17:03:07Z","timestamp":1593277387000},"page":"393-399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm"],"prefix":"10.1007","author":[{"given":"Akash","family":"Gerard","sequence":"first","affiliation":[]},{"given":"Rabia","family":"Latif","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Naqash","family":"Gerard","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Husnain Johar","sequence":"additional","affiliation":[]},{"given":"Umer","family":"Asghar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"key":"52_CR1","unstructured":"Gens, F.: New IDC IT Cloud Service Survey: Top Benefits and Challenges, IDC Exchange (2009). \nhttp:\/\/blogs.idc.com\/ie\/?p=730S"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Jensen, M.: Attack surfaces: a taxonomy for attacks on cloud services. In: 2010 IEEE 3rd International Conference on Cloud Computing. IEEE (2010)","DOI":"10.1109\/CLOUD.2010.23"},{"key":"52_CR3","unstructured":"http:\/\/mil-embedded.com\/articles\/cloud-security-the-dod\/\n\n. Accessed 11 Dec 2017"},{"issue":"8","key":"52_CR4","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1016\/j.future.2012.03.010","volume":"28","author":"RN Calheiros","year":"2012","unstructured":"Calheiros, R.N., et al.: A coordinator for scaling elastic applications across multiple clouds. Future Gener. Comput. Syst. 28(8), 1350\u20131362 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Lo, C.-C., Huang, C.-C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 2010 39th International Conference on Parallel Processing Workshops (ICPPW). IEEE (2010)","DOI":"10.1109\/ICPPW.2010.46"},{"key":"52_CR6","unstructured":"MacDermott, \u00c1., Shi, Q., Kifayat, K.: Collaborative intrusion detection in federated cloud environments. J. Comput. Sci. Appl. Big Data Anal. Intell. Syst. 3, 10\u201320 (2015)"},{"issue":"1","key":"52_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TST.2013.6449406","volume":"18","author":"Z Chen","year":"2013","unstructured":"Chen, Z., et al.: Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua Sci. Technol. 18(1), 40\u201350 (2013)","journal-title":"Tsinghua Sci. Technol."},{"issue":"1","key":"52_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s13677-017-0082-3","volume":"6","author":"A M\u00fcller","year":"2017","unstructured":"M\u00fcller, A., Ludwig, A., Franczyk, B.: Data security in decentralized cloud systems\u2013system comparison, requirements analysis and organizational levels. J. Cloud Comput. 6(1), 15 (2017)","journal-title":"J. Cloud Comput."},{"key":"52_CR9","unstructured":"Jahan, A., Alam, M.A.: Intrusion detection systems based on artificial intelligence. Int. J. Adv. Res. Comput. Sci. 8(5), 1\u20136 (2017)"},{"issue":"4","key":"52_CR10","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10462-010-9179-5","volume":"34","author":"G Kumar","year":"2010","unstructured":"Kumar, G., Kumar, K., Sachdeva, M.: The use of artificial intelligence based techniques for intrusion detection: a review. Artif. Intell. Rev. 34(4), 369\u2013387 (2010)","journal-title":"Artif. Intell. Rev."},{"issue":"10","key":"52_CR11","doi-asserted-by":"publisher","first-page":"351047","DOI":"10.1155\/2013\/351047","volume":"9","author":"NA Alrajeh","year":"2013","unstructured":"Alrajeh, N.A., Lloret, J.: Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(10), 351047 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1","key":"52_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"C-F Tsai","year":"2010","unstructured":"Tsai, C.-F., Lin, C.-Y.: A triangle area based nearest neighbors\u2019 approach to intrusion detection. Pattern Recogn. 43(1), 222\u2013229 (2010)","journal-title":"Pattern Recogn."},{"key":"52_CR14","doi-asserted-by":"crossref","unstructured":"Tan, Z., et al.: Denial-of-service attack detection based on multivariate correlation analysis. In: International Conference on Neural Information Processing. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-24965-5_85"},{"issue":"2","key":"52_CR15","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TPDS.2013.146","volume":"25","author":"Z Tan","year":"2014","unstructured":"Tan, Z., et al.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447\u2013456 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Moustafa, N., et al.: Collaborative anomaly detection framework for handling big data of cloud computing. In: Military Communications and Information Systems Conference (MilCIS) 2017. IEEE (2017)","DOI":"10.1109\/MilCIS.2017.8190421"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Neuroergonomics and Cognitive Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51041-1_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T17:16:38Z","timestamp":1593278198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51041-1_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"ISBN":["9783030510404","9783030510411"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51041-1_52","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,28]]},"assertion":[{"value":"28 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ahfe2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}