{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:59:35Z","timestamp":1743076775211,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811556784"},{"type":"electronic","value":"9789811556791"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_23","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"243-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Attack Detection Framework for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Suryakant","family":"Badde","sequence":"first","affiliation":[]},{"given":"Vikash","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Ditipriya","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Li, C. (ed.): Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions. IGI Global (2010)","DOI":"10.4018\/978-1-60566-836-9"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Qiu, J., Wu, Q., Ding, G., Xu, Y., Feng, S.: A survey of machine learning for big data processing. EURASIP J. Adv. Signal Process. 67 (2016)","DOI":"10.1186\/s13634-016-0355-x"},{"key":"23_CR3","unstructured":"Shahul Kshirsagar, S.Y.: Intrusion detection systems: a survey and analysis of classification techniques. Int. J. Scienti. Res. Eng. Technol. IJRSET 3(4), 742\u2013747 (2014)"},{"key":"23_CR4","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. In: Proceedings of 11th Symposium on High Performance Interconnects, pp. 44\u201351. IEEE (2003)"},{"issue":"1\u20132","key":"23_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.mcm.2011.01.050","volume":"55","author":"I Lee","year":"2012","unstructured":"Lee, I., Jeong, S., Yeo, S., Moon, J.: A novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55(1\u20132), 58\u201368 (2012)","journal-title":"Math. Comput. Model."},{"issue":"10","key":"23_CR6","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","volume":"32","author":"W-H Chen","year":"2005","unstructured":"Chen, W.-H., Hsu, S.-H., Shen, H.-P.: Application of SVM and ANN for intrusion detection. Comput. Oper. Res. 32(10), 2617\u20132634 (2005)","journal-title":"Comput. Oper. Res."},{"key":"23_CR7","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1988)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Dotcenko, S., Vladyko, A., Letenko, I.: A fuzzy logic-based information security management for software-defined networks. In: 16th International Conference on Advanced Communication Technology, pp. 167\u2013171 (2014)","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Shafer, G.: A mathematical theory of evidence turns 40. Int. J. Approxi. Reason. 79, 7\u201325, 2016. 40\u00a0years of Research on Dempster-Shafer theory","DOI":"10.1016\/j.ijar.2016.07.009"},{"key":"23_CR10","first-page":"12","volume":"11","author":"Z Yazar","year":"2002","unstructured":"Yazar, Z.: A qualitative risk analysis and management tool\u2014CRAMM. SANS InfoSec Reading Room White Paper 11, 12\u201332 (2002)","journal-title":"SANS InfoSec Reading Room White Paper"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:10:10Z","timestamp":1598688610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}