{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:58Z","timestamp":1725702178976},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_42","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"432-443","source":"Crossref","is-referenced-by-count":6,"title":["eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Madhan Kumar","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"K.","family":"Sarukesi","sequence":"additional","affiliation":[]},{"given":"Ashima","family":"Keshava","sequence":"additional","affiliation":[]},{"given":"P.","family":"Revathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/2345396.2345474","volume-title":"ICACCI 2012","author":"K.S. Madhan","year":"2012","unstructured":"Madhan, K.S., Sarukesi, K., Rodrigues, P., Saimanoj, M., Revathy, P.: State-of-the-art Cloud Computing Security Taxonomies \u2013 A classification of security challenges in the present cloud computing environment. In: ICACCI 2012, pp. 470\u2013476. ACM, India (2012), doi:10.1145\/2345396.2345474, ISBN: 978-1-4503-1196-0"},{"key":"42_CR2","unstructured":"Cloud Computing and Sustainability: The Environmental Benefits of moving to the Cloud. Technical report, Accenture (2010)"},{"key":"42_CR3","series-title":"CCIS","first-page":"358","volume-title":"SNDS 2012","author":"M.K. Srinivasan","year":"2012","unstructured":"Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P.: eCloudIDS \u2013 Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 358\u2013371. Springer, Heidelberg (2012)"},{"key":"42_CR4","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Technical report, Cloud Security Alliance (2009)"},{"key":"42_CR5","unstructured":"Top Threats to Cloud Computing V1.0. Technical report, Cloud Security Alliance (2010)"},{"key":"42_CR6","unstructured":"What\u2019s Holding Back the Cloud? Technical report, Intel IT Center (2012)"},{"key":"42_CR7","unstructured":"Securing Multi-Tenancy and Cloud Computing. Technical report, Juniper Networks (2012)"},{"key":"42_CR8","unstructured":"Li, H., Sedayao, J., Hahn-Steichen, J., Jimison, E., Spence, C., Chahal, S.: Developing an Enterprise Cloud Computing Strategy. Technical report, Intel Corporation (2009)"},{"key":"42_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-14478-3_36","volume-title":"Recent Trends in Network Security and Applications","author":"S. Madhan Kumar","year":"2010","unstructured":"Madhan Kumar, S., Rodrigues, P.: A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol.\u00a089, pp. 349\u2013358. Springer, Heidelberg (2010)"},{"issue":"4","key":"42_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.5121\/ijasuc.2010.1406","volume":"1","author":"K.S. Madhan","year":"2010","unstructured":"Madhan, K.S., Rodrigues, P.: Analysis on Identity Management Systems with Extended State-of-the-art IdM Taxonomy Factors. International Journal of Ad hoc, Sensor & Ubiquitous Computing\u00a01(4), 62\u201370 (2010), doi:10.5121\/ijasuc.2010.1406","journal-title":"International Journal of Ad hoc, Sensor & Ubiquitous Computing"},{"key":"42_CR11","unstructured":"Shiels, M.: Malicious insider attacks to rise. Technical report, BBC News (2009)"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145. Technical report, National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"42_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-28650-9_5","volume-title":"Advanced Lectures on Machine Learning","author":"Z. Ghahramani","year":"2004","unstructured":"Ghahramani, Z.: Unsupervised Learning. In: Bousquet, O., von Luxburg, U., R\u00e4tsch, G. (eds.) Machine Learning 2003. LNCS (LNAI), vol.\u00a03176, pp. 72\u2013112. Springer, Heidelberg (2004)"},{"issue":"4","key":"42_CR14","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.engappai.2006.09.005","volume":"20","author":"H.G. Kayacik","year":"2007","unstructured":"Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: A Hierarchical SOM based Intrusion Detection System. Journal of Engineering Applications of Artificial Intelligence\u00a020(4), 439\u2013451 (2007), doi:10.1016\/j.engappai.2006.09.005","journal-title":"Journal of Engineering Applications of Artificial Intelligence"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Patole, V.A., Pachghare, V.K., Kulkarni, P.: Self-Organizing Maps to Build Intrusion Detection System. Intl. Journal of Computer Applications, 1\u20134 (2010)","DOI":"10.5120\/191-328"},{"key":"42_CR16","unstructured":"Khaled, L., Rao, V.: NSOM \u2013 A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps. University of California. Technical report. Davis (2002)"},{"key":"42_CR17","unstructured":"Zanero, S.: Improving Self-Organizing Map Performance for Network Intrusion Detection. In: SDM 2005 Workshop on Clustering High Dimensional Data and its Applications (2005)"},{"key":"42_CR18","unstructured":"Bivens, A., Palagiri, C., Smith, R., Szymanski, B., Embrechts, M.: Network-based Intrusion Detection using Neural Networks. In: Intelligent Engineering Systems through Artificial Neural Networks, ANNIE 2002, New York, vol.\u00a012, pp. 579\u2013584 (2002)"},{"key":"42_CR19","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1145\/2345396.2345476","volume-title":"ACM ICACCI 2012","author":"B. Keerthi","year":"2012","unstructured":"Keerthi, B., Madhan, K.S., Sarukesi, K., Rodrigues, P.: Implementation of Next-generation Traffic Sign Recognition System with Two-tier Classifier Architecture. In: ACM ICACCI 2012, pp. 481\u2013487. ACM, India (2012), doi:10.1145\/2345396.2345476"},{"key":"42_CR20","series-title":"CCIS","first-page":"408","volume-title":"SNDS 2012","author":"K. Balasundaram","year":"2012","unstructured":"Balasundaram, K., Srinivasan, M.K., Sarukesi, K.: iReSign-Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture using Hybrid Region-Based Shape Representation Techniques. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 408\u2013421. Springer, Heidelberg (2012)"},{"key":"42_CR21","unstructured":"CloudStack 3.0.0 Release Notes. Technical report. Citrix Systems, Inc. (2012)"},{"key":"42_CR22","unstructured":"XenServer 6.0 Release Notes. Technical report. Citrix Systems, Inc. (2012)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:13:24Z","timestamp":1606187604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}