{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:02Z","timestamp":1725882722204},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_53","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"533-539","source":"Crossref","is-referenced-by-count":0,"title":["Implementing Anti-Malware as Security-as-a-Service from Cloud"],"prefix":"10.1007","author":[{"given":"Deepak H.","family":"Sharma","sequence":"first","affiliation":[]},{"given":"C. A.","family":"Dhote","sequence":"additional","affiliation":[]},{"given":"Manish M.","family":"Potey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Chris Jarabek, David Barrera, and John Aycock. 2012. ThinAV: truly lightweight mobile cloud-based anti-malware. In\u00a0Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC \u201812). ACM, New York, NY, USA, 209\u2013218.","DOI":"10.1145\/2420950.2420983"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"J. Xu, J. Yan, L. He, P. Su and D. Feng, \u201cCloudSEC: A Cloud Architecture for Composing Collaborative Security Services,\u201d\u00a0Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, Indianapolis, IN, 2010, pp. 703\u2013711.","DOI":"10.1109\/CloudCom.2010.16"},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"W. Yan, \u201cCAS: A framework of online detecting advance malware families for cloud-based security,\u201d\u00a02012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 2012, pp. 220\u2013225.","DOI":"10.1109\/ICCChina.2012.6356881"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Mohammed Hussain and Hanady Abdulsalam. 2011. SECaaS: security as a service for cloud-based applications. In\u00a0Proceedings of the Second Kuwait Conference on e-Services and e-Systems(KCESS \u201811). ACM, New York, NY, USA,, Article 8, 4 pages.","DOI":"10.1145\/2107556.2107564"},{"key":"53_CR5","doi-asserted-by":"crossref","unstructured":"Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh Gupta, and Melih Abdulhayoglu. 2011. Combining file content and file relations for cloud based malware detection. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD \u201811). ACM, New York, NY, USA, 222\u2013230.","DOI":"10.1145\/2020408.2020448"},{"key":"53_CR6","unstructured":"Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O\u2019Reilly Media, 336."},{"key":"53_CR7","unstructured":"Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010."},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Deepak Sharma, Dr. C A. Dhote, Manish Potey, \u2018Security-as-a-Service from Clouds: A comprehensive Analysis\u2019, IJCA Volume 67-Number 3, April 2013.","DOI":"10.5120\/11374-6642"},{"key":"53_CR9","unstructured":"Deepak Sharma, Dr. C A. Dhote, Manish Potey, \u2018Security-as-a-Service from Clouds : A survey\u2019 IIJC Vol 1 Issue 4, October 2011."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T16:30:53Z","timestamp":1568910653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_53","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}