{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:10:02Z","timestamp":1749687002395,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811016264"},{"type":"electronic","value":"9789811016271"}],"license":[{"start":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T00:00:00Z","timestamp":1478217600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-1627-1_20","type":"book-chapter","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T11:21:07Z","timestamp":1478172067000},"page":"259-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Pub-Sub Based Architecture for IDS as Service"],"prefix":"10.1007","author":[{"given":"Ma\u00efssa","family":"Mbaye","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cheikh","family":"Ba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,4]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Bace, R.: NIST Special Publication on Intrusion Detection Systems (2001)","DOI":"10.1201\/1079\/43273.29.5.20011101\/31414.1"},{"key":"20_CR2","unstructured":"Ms. Shelke, P.K., Ms. Sontakke, S., Dr. Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1, 67\u201371 (2012)"},{"key":"20_CR3","unstructured":"Robert, P.-C., Voas Mark, J.M., Badger, L., Grance, T.: Cloud computing synopsis and recommendations. Technical report, Gaithersburg, MD, United States (2012)"},{"key":"20_CR4","unstructured":"Yusuf, S.: Survey of publish subscribe communication system. Adv. Internet Appl. Syst. Des. 24 (2004)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Li, M., Ye, F., Kim, M., Chen, H., Lei, H.: Bluedove: a scalable and elastic publish\/subscribe service. Int. Parallel Distrib. Process. Symp. (2011)","DOI":"10.1109\/IPDPS.2011.119"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Xiao-yu, L., Wang, X., Ting-lei, H.: Research on the intrusion detection mechanism based on cloud computing. In: International Conference on Intelligent Computing and Integrated Systems (ICISS), pp. 125\u2013128 (2010)","DOI":"10.1109\/ICISS.2010.5656789"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Alharkan, T., Martin, P.: Idsaas: Intrusion detection system as a service in public clouds. In: CCGRID, pp. 686\u2013687 (2012)","DOI":"10.1109\/CCGrid.2012.81"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a network IDS into an open source cloud computing environment. In: IAS, pp. 265\u2013270 (2010)","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W., for Kwok, L., Xiang, Y.: Towards designing privacy-preserving signature-based IDS as a service: a study and practice. In: INCoS, pp. 181\u2013188 (2013)","DOI":"10.1109\/INCoS.2013.35"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Vaid, C., Verma, H.K.: Anomaly-based IDS implementation in cloud environment using BOAT algorithm. In: IEEE-ICRITO\u201914, pp. 1\u20136 (2014)","DOI":"10.1109\/ICRITO.2014.7014762"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Alqahtani, S.M., Balushi, M.A., John, R.: An intelligent intrusion detection system for cloud computing (SIDSCC). In: IEEE-CSCI\u201914, pp. 135\u2013141 (2014)","DOI":"10.1109\/CSCI.2014.108"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Mohamed, H., Adil, L., Saida, T., Hicham, M.: A collaborative intrusion detection and prevention system in cloud computing. In: IEEE-AFRICON 2013, pp. 1\u20135 (2013)","DOI":"10.1109\/AFRCON.2013.6757727"},{"key":"20_CR13","unstructured":"Radatz, J.: The IEEE Standard Dictionary of Electrical and Electronics Terms, 6th edn. IEEE Standards Office, New York, NY, USA (1997)"},{"issue":"1","key":"20_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2004.06.011","volume":"24","author":"S Hansman","year":"2005","unstructured":"Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput. Secur. 24(1), 31\u201343 (2005)","journal-title":"Comput. Secur."},{"key":"20_CR15","first-page":"26","volume":"1","author":"W Zheng","year":"2011","unstructured":"Zheng, W., Yang, O., Liu, Y.: A taxonomy of network and computer attacks based on responses. Int. Conf. Inf. Technol. Comput. Eng. Manage. Sci. 1, 26\u201329 (2011)","journal-title":"Int. Conf. Inf. Technol. Comput. Eng. Manage. Sci."},{"key":"20_CR16","unstructured":"Zafar, B., Khan, F.A., ud Din, F., Ahmad, W., Hayat, Z., Shah, I.: A survey on taxonomies of attacks and vulnerabilities in computer systems. Int. J. Comput. Sci. Telecommun. 3, 93\u201397 (2012)"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Ubiquitous Networking 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-1627-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:47:33Z","timestamp":1749685653000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-10-1627-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,4]]},"ISBN":["9789811016264","9789811016271"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-1627-1_20","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2016,11,4]]},"assertion":[{"value":"4 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}