{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:05:28Z","timestamp":1772906728528,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":68,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_30","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"481-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Intrusion Detection Systems in Fog Computing \u2013 A Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7014-2376","authenticated-orcid":false,"given":"Fadi Abu","family":"Zwayed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-6408","authenticated-orcid":false,"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4442-1865","authenticated-orcid":false,"given":"Yousef","family":"Sanjalawe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4378-1954","authenticated-orcid":false,"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of 1st ACM Mobile Cloud Computing Workshop, MCC 2012, pp. 13\u201315 (2012). https:\/\/doi.org\/10.1145\/2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Sanjalawe, Y., Anbar, M., Al-E\u2019mari, S., Abdullah, R., Hasbullah, I., Aladaileh, M.: Cloud data center selection using a modified differential evolution. Comput. Mater. Continua 69, 3179\u20133204 (2021). https:\/\/doi.org\/10.32604\/cmc.2021.018546","DOI":"10.32604\/cmc.2021.018546"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.6028\/NIST.SP.500-325","volume":"500\u2013325","author":"M Iorga","year":"2018","unstructured":"Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N., Mahmoudi, C.: Fog computing conceptual model. NIST Spec. Publ. 500\u2013325, 1\u201313 (2018). https:\/\/doi.org\/10.6028\/NIST.SP.500-325","journal-title":"NIST Spec. Publ."},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","volume":"8","author":"MA Aladaileh","year":"2020","unstructured":"Aladaileh, M.A., Anbar, M., Hasbullah, I.H., Chong, Y.W., Sanjalawe, Y.K.: Detection techniques of distributed denial of service attacks on software-defined networking controller-a review. IEEE Access. 8, 143985\u2013143995 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3013998","journal-title":"IEEE Access."},{"key":"30_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-981-33-6835-4_5","volume-title":"Advances in Cyber Security","author":"S Al-E\u2019mari","year":"2021","unstructured":"Al-E\u2019mari, S., Anbar, M., Sanjalawe, Y., Manickam, S.: A labeled transactions-based dataset on the ethereum network. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 61\u201379. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_5"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. Comput. Commun. Rev. 44, 27\u201332 (2014). https:\/\/doi.org\/10.1145\/2677046.2677052","journal-title":"Comput. Commun. Rev."},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3, 854\u2013864 (2016). https:\/\/doi.org\/10.1109\/JIOT.2016.2584538","journal-title":"IEEE Internet Things J."},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, FedCSIS 2014, pp. 1\u20138 (2014). https:\/\/doi.org\/10.15439\/2014F503","DOI":"10.15439\/2014F503"},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: Proceedings of 3rd Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2015, pp. 73\u201378 (2016). https:\/\/doi.org\/10.1109\/HotWeb.2015.22","DOI":"10.1109\/HotWeb.2015.22"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1109\/LCOMM.2016.2647595","volume":"21","author":"X Chen","year":"2017","unstructured":"Chen, X., Wang, L.: Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method - PEPA. IEEE Commun. Lett. 21, 745\u2013748 (2017). https:\/\/doi.org\/10.1109\/LCOMM.2016.2647595","journal-title":"IEEE Commun. Lett."},{"key":"30_CR11","unstructured":"Kitanov, S., Janevski, T.: Fog networking for 5G and IoT. In: 5G Mobile: From Research and Innovations to Deployment Aspects, pp. 45\u201369 (2017)"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 1125\u20131142 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2683200","journal-title":"IEEE Internet Things J."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27\u201342 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.09.002","journal-title":"J. Netw. Comput. Appl."},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2018","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20, 601\u2013628 (2018). https:\/\/doi.org\/10.1109\/COMST.2017.2762345","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"30_CR15","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1007\/s11276-018-1794-0","volume":"25","author":"L Liu","year":"2018","unstructured":"Liu, L., Guo, X., Chang, Z., Ristaniemi, T.: Joint optimization of energy and delay for computation offloading in cloudlet-assisted mobile cloud computing. Wirel. Netw. 25(4), 2027\u20132040 (2018). https:\/\/doi.org\/10.1007\/s11276-018-1794-0","journal-title":"Wirel. Netw."},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-319-99007-1_39","volume":"843","author":"A Amairah","year":"2019","unstructured":"Amairah, A., Al-Tamimi, B.N., Anbar, M., Aloufi, K.: Cloud computing and internet of things integration systems: a review. Adv. Intell. Syst. Comput. 843, 406\u2013414 (2019). https:\/\/doi.org\/10.1007\/978-3-319-99007-1_39","journal-title":"Adv. Intell. Syst. Comput."},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1109\/COMST.2020.3020854","volume":"22","author":"H Wang","year":"2020","unstructured":"Wang, H., et al.: Architectural design alternatives based on cloud\/edge\/fog computing for connected vehicles. IEEE Commun. Surv. Tutor. 22, 2349\u20132377 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.3020854","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"30_CR18","doi-asserted-by":"publisher","unstructured":"Shi, Y., Ding, G., Wang, H., Eduardo Roman, H., Lu, S.: The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare, Ubi-HealthTech 2015, pp. 70\u201374 (2015). https:\/\/doi.org\/10.1109\/Ubi-HealthTech.2015.7203325","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"30_CR19","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun. Surv. Tutor. 20, 1826\u20131857 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2814571","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"30_CR20","doi-asserted-by":"publisher","unstructured":"Aazam, M., Huh, E.N.: Fog computing and smart gateway based communication for cloud of things. In: Proceedings of 2014 International Conference on Future Internet of Things and Cloud, FiCloud 2014, pp. 464\u2013470 (2014). https:\/\/doi.org\/10.1109\/FiCloud.2014.83","DOI":"10.1109\/FiCloud.2014.83"},{"key":"30_CR21","doi-asserted-by":"publisher","unstructured":"Aazam, M., Huh, E.N.: Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: Proceedings of International Conference on Advanced Information Networking and Applications, AINA, April 2015, pp. 687\u2013694 (2015). https:\/\/doi.org\/10.1109\/AINA.2015.254","DOI":"10.1109\/AINA.2015.254"},{"key":"30_CR22","first-page":"422","volume":"6","author":"M Muntjir","year":"2017","unstructured":"Muntjir, M., Rahul, M., Alhumyani, H.A.: An analysis of internet of things (IoT): novel architectures, modern applications, security aspects and future scope with latest case studies. Int. J. Eng. Res. Technol. 6, 422\u2013447 (2017)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"30_CR23","doi-asserted-by":"publisher","unstructured":"Aazam, M., Hung, P.P., Huh, E.N.: Smart gateway based communication for cloud of things. In: 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings, IEEE ISSNIP 2014 (2014). https:\/\/doi.org\/10.1109\/ISSNIP.2014.6827673","DOI":"10.1109\/ISSNIP.2014.6827673"},{"key":"30_CR24","doi-asserted-by":"publisher","unstructured":"Marques, B., MacHado, I., Sena, A., Castro, M.C.: A communication protocol for fog computing based on network coding applied to wireless sensors. In: Proceedings of 29th International Symposium on Computer Architecture and High Performance Computing Work, SBAC-PADW 2017, pp. 109\u2013114 (2017). https:\/\/doi.org\/10.1109\/SBAC-PADW.2017.27","DOI":"10.1109\/SBAC-PADW.2017.27"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11277-012-0692-5","volume":"70","author":"A Rodr\u00edguez Natal","year":"2013","unstructured":"Rodr\u00edguez Natal, A., et al.: LISP-MN: mobile networking through LISP. Wirel. Pers. Commun. 70, 253\u2013266 (2013). https:\/\/doi.org\/10.1007\/s11277-012-0692-5","journal-title":"Wirel. Pers. Commun."},{"key":"30_CR26","doi-asserted-by":"publisher","unstructured":"Hassan, M.A., Xiao, M., Wei, Q., Chen, S.: Help your mobile applications with fog computing. In: 2015 12th Annual IEEE International Conference on Sensing, Communication and Networking, SECON Workshop 2015, pp. 49\u201354 (2015). https:\/\/doi.org\/10.1109\/SECONW.2015.7328146","DOI":"10.1109\/SECONW.2015.7328146"},{"key":"30_CR27","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1005-8885(16)60021-3","volume":"23","author":"K Kai","year":"2016","unstructured":"Kai, K., Cong, W., Tao, L.: Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J. China Univ. Posts Telecommun. 23, 56\u201396 (2016). https:\/\/doi.org\/10.1016\/S1005-8885(16)60021-3","journal-title":"J. China Univ. Posts Telecommun."},{"key":"30_CR28","doi-asserted-by":"publisher","unstructured":"Hong, K., Lillethun, D., Ramachandran, U., Ottenw\u00e4lder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of 2nd, 2013 ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC 2013, pp. 15\u201320 (2013). https:\/\/doi.org\/10.1145\/2491266.2491270","DOI":"10.1145\/2491266.2491270"},{"key":"30_CR29","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1109\/TVT.2015.2445833","volume":"65","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Niyato, D., Wang, P., Kim, D.I.: Optimal energy management policy of mobile energy gateway. IEEE Trans. Veh. Technol. 65, 3685\u20133699 (2016). https:\/\/doi.org\/10.1109\/TVT.2015.2445833","journal-title":"IEEE Trans. Veh. Technol."},{"key":"30_CR30","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali, F., Hinton, K., Ayre, R., Alpcan, T., Tucker, R.S.: Fog computing may help to save energy in cloud computing. IEEE J. Sel. Areas Commun. 34, 1728\u20131739 (2016). https:\/\/doi.org\/10.1109\/JSAC.2016.2545559","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"30_CR31","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618\u2013644 (2007). https:\/\/doi.org\/10.1016\/j.dss.2005.05.019","journal-title":"Decis. Support Syst."},{"key":"30_CR32","doi-asserted-by":"publisher","unstructured":"Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 207\u2013216 (2002). https:\/\/doi.org\/10.1145\/586110.586138","DOI":"10.1145\/586110.586138"},{"key":"30_CR33","doi-asserted-by":"publisher","unstructured":"Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A measurement based rogue AP detection scheme. In: Proceedings of IEEE INFOCOM, pp. 1593\u20131601 (2009). https:\/\/doi.org\/10.1109\/INFCOM.2009.5062077","DOI":"10.1109\/INFCOM.2009.5062077"},{"key":"30_CR34","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1109\/TPDS.2011.125","volume":"22","author":"H Han","year":"2011","unstructured":"Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22, 1912\u20131925 (2011). https:\/\/doi.org\/10.1109\/TPDS.2011.125","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR35","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Proceedings of 9th Annual Network and Distributed System Security Symposium, pp. 7\u201319 (2002)"},{"key":"30_CR36","doi-asserted-by":"publisher","unstructured":"Bouzefrane, S., Mostefa, A.F.B., Houacine, F., Cagnon, H.: Cloudlets authentication in nfc-based mobile computing. Proceedings of 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014, pp. 267\u2013272 (2014). https:\/\/doi.org\/10.1109\/MobileCloud.2014.46","DOI":"10.1109\/MobileCloud.2014.46"},{"key":"30_CR37","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4614-9278-8_4","volume-title":"Secure Cloud Computing","author":"M Tsugawa","year":"2014","unstructured":"Tsugawa, M., Matsunaga, A., Fortes, J.A.B.: Cloud computing security: what changes with software-defined networking? In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing, pp. 77\u201393. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_4"},{"key":"30_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465\u2013482. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_25"},{"key":"30_CR39","doi-asserted-by":"publisher","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pp. 44\u201355 (2000). https:\/\/doi.org\/10.1109\/secpri.2000.848445","DOI":"10.1109\/secpri.2000.848445"},{"key":"30_CR40","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23, 1467\u20131479 (2012). https:\/\/doi.org\/10.1109\/TPDS.2011.282","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR41","doi-asserted-by":"crossref","unstructured":"Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Citeseer (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"30_CR42","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25, 222\u2013233 (2014). https:\/\/doi.org\/10.1109\/TPDS.2013.45","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR43","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, USA, pp. 49\u201360 (2011)","DOI":"10.1145\/2046556.2046564"},{"key":"30_CR44","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users\u2019 privacy in cognitive radio networks. In: Proceedings of IEEE INFOCOM, Toronto, ON, Canada, pp. 772\u2013780. Institute of Electrical and Electronics Engineers Inc. (2014)","DOI":"10.1109\/INFOCOM.2014.6848004"},{"key":"30_CR45","doi-asserted-by":"crossref","unstructured":"Novak, E., Li, Q.: Near-Pri: private, proximity based location sharing. In: Proceedings - IEEE INFOCOM, Toronto, ON, Canada, pp. 37\u201345. Institute of Electrical and Electronics Engineers Inc. (2014)","DOI":"10.1109\/INFOCOM.2014.6847922"},{"key":"30_CR46","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23, 1621\u20131632 (2012). https:\/\/doi.org\/10.1109\/TPDS.2012.86","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR47","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, USA, pp. 87\u201398 (2011)","DOI":"10.1145\/2046707.2046720"},{"key":"30_CR48","doi-asserted-by":"publisher","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680\u2013698 (2018). https:\/\/doi.org\/10.1016\/j.future.2016.11.009","DOI":"10.1016\/j.future.2016.11.009"},{"key":"30_CR49","doi-asserted-by":"crossref","unstructured":"Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a review of current applications and security solutions (2017). https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-017-0090-3","DOI":"10.1186\/s13677-017-0090-3"},{"key":"30_CR50","doi-asserted-by":"publisher","first-page":"167059","DOI":"10.1109\/ACCESS.2020.3022855","volume":"8","author":"K Sadaf","year":"2020","unstructured":"Sadaf, K., Sultana, J.: Intrusion detection based on autoencoder and isolation forest in fog computing. IEEE Access 8, 167059\u2013167068 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022855","journal-title":"IEEE Access"},{"key":"30_CR51","doi-asserted-by":"publisher","unstructured":"Khater, B.S., Wahab, A.W.B.A., Idris, M.Y.I.B., Hussain, M.A., Ibrahim, A.A.: A lightweight perceptron-based intrusion detection system for fog computing. Appl. Sci. 9, 178 (2019). https:\/\/doi.org\/10.3390\/app9010178","DOI":"10.3390\/app9010178"},{"key":"30_CR52","doi-asserted-by":"publisher","unstructured":"Bhuvaneswari Amma, N.G., Selvakumar, S.: Anomaly detection framework for internet of things traffic using vector convolutional deep learning approach in fog environment. Futur. Gener. Comput. Syst. 113, 255\u2013265 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.07.020","DOI":"10.1016\/j.future.2020.07.020"},{"key":"30_CR53","doi-asserted-by":"publisher","first-page":"106997","DOI":"10.1016\/j.asoc.2020.106997","volume":"100","author":"R SaiSindhuTheja","year":"2021","unstructured":"SaiSindhuTheja, R., Shyam, G.K.: An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Appl. Soft Comput. 100, 106997 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.106997","journal-title":"Appl. Soft Comput."},{"key":"30_CR54","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset, M., Chang, V., Hawash, H., Chakrabortty, R.K., Ryan, M.: Deep-IFS: intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans. Ind. Inform. 17, 7704\u20137715 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3025755","journal-title":"IEEE Trans. Ind. Inform."},{"key":"30_CR55","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TCBB.2020.2994780","volume":"18","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Li, Y., Liang, W.: CNN-RNN based intelligent recommendation for online medical pre-diagnosis support. IEEE\/ACM Trans. Comput. Biol. Bioinform. 18, 912\u2013921 (2021). https:\/\/doi.org\/10.1109\/TCBB.2020.2994780","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"30_CR56","doi-asserted-by":"publisher","unstructured":"de Souza, C.A., Westphall, C.B., Machado, R.B., Sobral, J.B.M., Vieira, G.S.: Hybrid approach to intrusion detection in fog-based IoT environments. Comput. Netw. 180, 107417 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107417","DOI":"10.1016\/j.comnet.2020.107417"},{"key":"30_CR57","doi-asserted-by":"crossref","unstructured":"Illy, P., Kaddoum, G., Moreira, C.M., Kaur, K., Garg, S.: Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: IEEE Wireless Communications and Networking Conference, WCNC, Marrakesh, Morocco. Institute of Electrical and Electronics Engineers Inc. (2019)","DOI":"10.1109\/WCNC.2019.8885534"},{"key":"30_CR58","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","volume":"166","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Gupta, G.P., Tripathi, R.: An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110\u2013124 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2020.12.003","journal-title":"Comput. Commun."},{"key":"30_CR59","doi-asserted-by":"publisher","unstructured":"Pani, A.K.: An efficient algorithmic technique for feature selection in IoT based intrusion detection system. Indian J. Sci. Technol. 14, 76\u201385 (2021). https:\/\/doi.org\/10.17485\/ijst\/v14i1.2057","DOI":"10.17485\/ijst\/v14i1.2057"},{"key":"30_CR60","doi-asserted-by":"crossref","unstructured":"Chekired, D.A., Khoukhi, L., Mouftah, H.T.: Fog-based distributed intrusion detection system against false metering attacks in smart grid. In: IEEE International Conference on Communications, Shanghai, China. Institute of Electrical and Electronics Engineers Inc. (2019)","DOI":"10.1109\/ICC.2019.8761752"},{"key":"30_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics9101565","volume":"9","author":"MA Lawal","year":"2020","unstructured":"Lawal, M.A., Shaikh, R.A., Hassan, S.R.: An anomaly mitigation framework for IoT using fog computing. Electronics 9, 1\u201324 (2020). https:\/\/doi.org\/10.3390\/electronics9101565","journal-title":"Electronics"},{"key":"30_CR62","doi-asserted-by":"publisher","unstructured":"Huang, T., Lin, W., Xiong, C., Pan, R., Huang, J.: An ant colony optimization-based multiobjective service replicas placement strategy for fog computing. IEEE Trans. Cybern. 1\u201314 (2020). https:\/\/doi.org\/10.1109\/tcyb.2020.2989309","DOI":"10.1109\/tcyb.2020.2989309"},{"key":"30_CR63","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jpdc.2018.08.007","volume":"122","author":"O Zedadra","year":"2018","unstructured":"Zedadra, O., Guerrieri, A., Jouandeau, N., Spezzano, G., Seridi, H., Fortino, G.: Swarm intelligence-based algorithms within IoT-based systems: a review. J. Parallel Distrib. Comput. 122, 173\u2013187 (2018). https:\/\/doi.org\/10.1016\/j.jpdc.2018.08.007","journal-title":"J. Parallel Distrib. Comput."},{"key":"30_CR64","first-page":"937","volume":"98","author":"AKAL Hwaitat","year":"2020","unstructured":"Hwaitat, A.K.A.L., Manaseer, S., Al-Sayyed, R.M.H., Almaiah, M.A., Almomani, O.: An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO). J. Theor. Appl. Inf. Technol. 98, 937\u2013952 (2020)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"30_CR65","doi-asserted-by":"publisher","unstructured":"Rahman, G., Wen, C.C.: Mutual authentication security scheme in fog computing. Int. J. Adv. Comput. Sci. Appl. 10, 443\u2013451 (2019). https:\/\/doi.org\/10.14569\/IJACSA.2019.0101161","DOI":"10.14569\/IJACSA.2019.0101161"},{"issue":"4","key":"30_CR66","doi-asserted-by":"publisher","first-page":"9469","DOI":"10.1007\/s10586-018-2365-y","volume":"22","author":"R Kesavamoorthy","year":"2018","unstructured":"Kesavamoorthy, R., Ruba Soundar, K.: Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system. Clust. Comput. 22(4), 9469\u20139476 (2018). https:\/\/doi.org\/10.1007\/s10586-018-2365-y","journal-title":"Clust. Comput."},{"key":"30_CR67","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-981-13-6031-2_34","volume-title":"Intelligent and Interactive Computing","author":"ST Alanazi","year":"2019","unstructured":"Alanazi, S.T., Anbar, M., Karuppayah, S., Al-Ani, A.K., Sanjalawe, Y.K.: Detection techniques for DDoS attacks in cloud environment: review paper. In: Piuri, V., Balas, V.E., Borah, S., Syed Ahmad, S.S. (eds.) Intelligent and Interactive Computing. LNNS, vol. 67, pp. 337\u2013354. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6031-2_34"},{"key":"30_CR68","doi-asserted-by":"publisher","unstructured":"Al Hwaitat, A.K., et al.: Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks. Int. J. Adv. Comput. Sci. Appl. 11, 614\u2013625 (2020). https:\/\/doi.org\/10.14569\/IJACSA.2020.0110480","DOI":"10.14569\/IJACSA.2020.0110480"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:17:20Z","timestamp":1638451040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}