{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:13:51Z","timestamp":1759335231321},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_45","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"466-473","source":"Crossref","is-referenced-by-count":11,"title":["An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework"],"prefix":"10.1007","author":[{"given":"Deepa","family":"Krishnan","sequence":"first","affiliation":[]},{"given":"Madhumita","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Zunnurhain, K., Vrbsky, S.V.: Security Attacks in Clouds. In: CloudCom 2010 (2010)","key":"45_CR1"},{"unstructured":"Kazienko, P., Dorosz, P.: Intrusion Detection Systems (IDS) Part2-Classification, methods, techniques (July 23, 2004), \n                    \n                      http:\/\/www.windowsecurity.com\/articles\/ids-part2-Classification-methods-techniques.html","key":"45_CR2"},{"unstructured":"Cox, P.: Intrusion detection in a cloud computing environment, \n                    \n                      http:\/\/www.searchcloudcom-putingtarget.com\/tip\/Intrusion-detection-in-a-cloud-computing-environment","key":"45_CR3"},{"unstructured":"Einwechter, N.: An introduction to Intrusion Detection System, \n                    \n                      http:\/\/www.symantec.com\/connect\/articles\/introduction-distributed-intrusion-detection-systems","key":"45_CR4"},{"unstructured":"Nikolai, J.: Detecting Unauthorized usage in a cloud using Tenant, \n                    \n                      http:\/\/www.homepages.dsu.edu\/malladis\/teach\/717\/Papers\/nikolai.pdf","key":"45_CR5"},{"doi-asserted-by":"crossref","unstructured":"Lo, C.-C., Huang, C.-C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks, 1530-2016\/10,2010 IEEE","key":"45_CR6","DOI":"10.1109\/ICPPW.2010.46"},{"doi-asserted-by":"crossref","unstructured":"Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion Detection for Grid and Cloud Computing, 1520-9202\/10,2010 IEEE","key":"45_CR7","DOI":"10.1109\/MITP.2009.89"},{"key":"45_CR8","first-page":"71","volume":"34","author":"I. Gul","year":"2011","unstructured":"Gul, I., Hussain, M.: Distributed Cloud Intrusion Detection Model. International Journal of Advanced Science and Technology\u00a034, 71\u201382 (2011)","journal-title":"International Journal of Advanced Science and Technology"},{"unstructured":"Zhang, G., Parashar, M.: Cooperative Defence against DDOS Attacks. Journal of Research and Practice in Information Technology\u00a038(1) (February 2006)","key":"45_CR9"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:57Z","timestamp":1620132357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}