{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T20:45:57Z","timestamp":1773866757855,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Natural Science Foundation of Hunan Province,China   Research on Key Technologies of enterprise network security and protection system in cloud computing environment","award":["Grant NO. 2020JJ6062"],"award-info":[{"award-number":["Grant NO. 2020JJ6062"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11036-023-02176-w","type":"journal-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T07:01:59Z","timestamp":1690959719000},"page":"2191-2203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment"],"prefix":"10.1007","volume":"28","author":[{"given":"Xingzhu","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,2]]},"reference":[{"key":"2176_CR1","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"9","author":"Y Zhang","year":"2003","unstructured":"Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wireless Netw 9:545\u2013556","journal-title":"Wireless Netw"},{"key":"2176_CR2","doi-asserted-by":"crossref","unstructured":"Dhage SN, Meshram BB (2012) Intrusion detection system in cloud computing environment. International Journal of Cloud Computing 1(2-3):261\u2013282","DOI":"10.1504\/IJCC.2012.046711"},{"issue":"2","key":"2176_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MPRV.2011.13","volume":"10","author":"J Chon","year":"2011","unstructured":"Chon J, Cha H (2011) Lifemap: a smartphone-based context provider for location-based services. IEEE Pervasive Comput 10(2):58\u201367","journal-title":"IEEE Pervasive Comput"},{"key":"2176_CR4","doi-asserted-by":"publisher","first-page":"33256","DOI":"10.1109\/ACCESS.2019.2903487","volume":"7","author":"CH Hsieh","year":"2019","unstructured":"Hsieh CH, Chen JY, Nien BH (2019) Deep learning-based indoor localization using received signal strength and channel state information. IEEE access 7:33256\u201333267","journal-title":"IEEE access"},{"issue":"2","key":"2176_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/cit2.12062","volume":"7","author":"X Ma","year":"2022","unstructured":"Ma X, Liu Y, Ouyang C (2022) Capturing semantic features to improve chinese event detection. CAAI Trans Intell Technol 7(2):219\u2013227","journal-title":"CAAI Trans Intell Technol"},{"issue":"2","key":"2176_CR6","first-page":"83","volume":"1","author":"Y Lei","year":"2022","unstructured":"Lei Y (2022) Research on microvideo character perception and recognition based on target detection technology. J Comput Cogn Eng 1(2):83\u201387","journal-title":"J Comput Cogn Eng"},{"issue":"11","key":"2176_CR7","doi-asserted-by":"publisher","first-page":"3148","DOI":"10.1109\/TMC.2020.2994955","volume":"20","author":"H Kong","year":"2020","unstructured":"Kong H, Lu L, Yu J, Chen Y, Tang F (2020) Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans Mob Comput 20(11):3148\u20133162","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"2176_CR8","first-page":"59","volume":"5","author":"T Teixeira","year":"2010","unstructured":"Teixeira T, Dublon G, Savvides A (2010) A survey of human-sensing: methods for detecting presence, count, location, track, and identity. ACM-CSUR 5(1):59\u201369","journal-title":"ACM-CSUR"},{"issue":"5","key":"2176_CR9","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang H, Wang M, Zhao P, Xiao Z, Dustdar S (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Trans Networking 29(5):2228\u20132241","journal-title":"IEEE\/ACM Trans Networking"},{"key":"2176_CR10","doi-asserted-by":"publisher","unstructured":"Kaltiokallio O, Bocca M, Patwari N (2012) \"Follow @grandma: Long-term device-free localization for residential monitoring,\" 37th Annual IEEE Conference on Local Computer Networks - Workshops, Clearwater, FL, USA, pp 991\u2013998. https:\/\/doi.org\/10.1109\/LCNW.2012.6424092","DOI":"10.1109\/LCNW.2012.6424092"},{"key":"2176_CR11","first-page":"102582","volume":"55","author":"S Shamshirband","year":"2020","unstructured":"Shamshirband S, Fathi M, Chronopoulos AT, Montieri A, Palumbo F, Pescap\u00e8 A (2020) Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues. J Inform Secur Appl 55:102582","journal-title":"J Inform Secur Appl"},{"key":"2176_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s11036-019-01220-y","volume":"25","author":"J Ribeiro","year":"2020","unstructured":"Ribeiro J, Saghezchi FB, Mantas G, Rodriguez J, Shepherd SJ, Abd-Alhameed RA (2020) An autonomous host-based intrusion detection system for android mobile devices. Mob Networks Appl 25:164\u2013172","journal-title":"Mob Networks Appl"},{"key":"2176_CR13","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.ins.2022.08.093","volume":"612","author":"B Li","year":"2022","unstructured":"Li B, Zhou X, Ning Z, Guan X, Yiu KC (2022) Dynamic event-triggered security control for networked control systems with cyber-attacks: a model predictive control approach. Inf Sci 612:384\u2013398. https:\/\/doi.org\/10.1016\/j.ins.2022.08.093","journal-title":"Inf Sci"},{"issue":"3","key":"2176_CR14","first-page":"103","volume":"1","author":"Z Chen","year":"2022","unstructured":"Chen Z (2022) Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. J Comput Cogn Eng 1(3):103\u2013108","journal-title":"J Comput Cogn Eng"},{"key":"2176_CR15","doi-asserted-by":"publisher","unstructured":"Adib F, Katabi D (2016) August. Seeing through walls with wireless signals. SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 75\u201386.\u00a0https:\/\/doi.org\/10.1117\/2.1201601.006311","DOI":"10.1117\/2.1201601.006311"},{"key":"2176_CR16","doi-asserted-by":"publisher","first-page":"30117","DOI":"10.1109\/ACCESS.2017.2785444","volume":"6","author":"J Lv","year":"2017","unstructured":"Lv J, Man D, Yang W, Du X, Yu M (2017) Robust WLAN-based indoor intrusion detection using PHY layer information. IEEE Access 6:30117\u201330127","journal-title":"IEEE Access"},{"issue":"1","key":"2176_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R Want","year":"1992","unstructured":"Want R, Hopper A, Falcao V, Gibbons J (1992) The active badge location system. ACM Trans Inform Syst (TOIS) 10(1):91\u2013102","journal-title":"ACM Trans Inform Syst (TOIS)"},{"issue":"4","key":"2176_CR18","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/MCOM.001.2000921","volume":"59","author":"G Liu","year":"2021","unstructured":"Liu G (2021) Data collection in mi-assisted wireless powered underground sensor networks: directions, recent advances, and challenges. IEEE Commun Mag 59(4):132\u2013138","journal-title":"IEEE Commun Mag"},{"key":"2176_CR19","doi-asserted-by":"publisher","unstructured":"Xiao Z, Shu J, Jiang H, Lui JCS, Min G, Liu J,... Dustdar S (2022) Multi-objective parallel task offloading and content caching in D2D-aided MEC Networks. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2022.3199876","DOI":"10.1109\/TMC.2022.3199876"},{"key":"2176_CR20","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2022.928863","volume":"16","author":"S Lu","year":"2022","unstructured":"Lu S, Ban Y, Zhang X, Yang B, Liu S, Yin L, Zheng W (2022) Adaptive control of time delay teleoperation system with uncertain dynamics. Front Neurorobot 16:928863. https:\/\/doi.org\/10.3389\/fnbot.2022.928863","journal-title":"Front Neurorobot"},{"key":"2176_CR21","doi-asserted-by":"crossref","unstructured":"Sun Y, Ma P, Dai J, Li D (2022) A cloud Bayesian network approach to situation assessment of scouting underwater targets with fixed-wing patrol aircraft. Ecological Modelling, p 418","DOI":"10.1049\/cit2.12108"},{"key":"2176_CR22","unstructured":"Ni LM, Liu Y, Lau YC, Patil AP (2003) Landmarc: Indoor location sensing using active RFID. Pervasive Computing and Communications, 2003. (PerCom 2003). In: Proceedings of the First IEEE International Conference on. IEEE"},{"issue":"1","key":"2176_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/TVT.2005.861162","volume":"55","author":"YT Chan","year":"2006","unstructured":"Chan YT, Hang HYC, Ching PC (2006) Exact and approximate maximum likelihood localization algorithms. IEEE Trans Veh Technol 55(1):10\u201316","journal-title":"IEEE Trans Veh Technol"},{"key":"2176_CR24","doi-asserted-by":"publisher","unstructured":"Zhang D, Ma J, Chen Q, Ni LM (2007)\u00a0March. \"An RF-Based System for Tracking Transceiver-Free Objects\". In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07), White Plains, NY, USA, 2007, pp 135\u2013144.\u00a0https:\/\/doi.org\/10.1109\/PERCOM.2007.8","DOI":"10.1109\/PERCOM.2007.8"},{"key":"2176_CR25","doi-asserted-by":"publisher","unstructured":"Fernandes R, Matos JN, Varum T, Pinho P (2014) \"Wi-Fi intruder detection,\" 2014 IEEE Conference on Wireless Sensors (ICWiSE), Subang, Malaysia, pp 96\u201399.\u00a0https:\/\/doi.org\/10.1109\/ICWISE.2014.7042668","DOI":"10.1109\/ICWISE.2014.7042668"},{"key":"2176_CR26","unstructured":"Wallbaum M, Diepolder S (2006) October. A motion detection scheme for wireless LAN stations. The 3rd international conference on mobile computing and ubiquitous networking, pp 2\u20139"},{"issue":"5","key":"2176_CR27","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/JSEN.2017.2787997","volume":"18","author":"Z Sun","year":"2017","unstructured":"Sun Z, Xu Y, Liang G, Zhou Z (2017) An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J 18(5):1971\u20131984","journal-title":"IEEE Sens J"},{"issue":"11","key":"2176_CR28","doi-asserted-by":"publisher","first-page":"5762","DOI":"10.1109\/TAC.2021.3124750","volume":"67","author":"B Li","year":"2021","unstructured":"Li B, Tan Y, Wu A, Duan G (2021) A distributionally robust optimization based method for stochastic model predictive control. IEEE Trans Autom Control 67(11):5762\u20135776. https:\/\/doi.org\/10.1109\/TAC.2021.3124750","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"2176_CR29","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3390\/app9010178","volume":"9","author":"B Sudqi Khater","year":"2019","unstructured":"Sudqi Khater B, Abdul Wahab AWB, Idris MYIB, Abdulla Hussain M, Ahmed Ibrahim A (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178","journal-title":"Appl Sci"},{"key":"2176_CR30","doi-asserted-by":"publisher","first-page":"185496","DOI":"10.1109\/ACCESS.2019.2960633","volume":"7","author":"K Haseeb","year":"2019","unstructured":"Haseeb K, Islam N, Almogren A, Din IU (2019) Intrusion prevention framework for secure routing in WSN-based mobile internet of things. Ieee Access 7:185496\u2013185505","journal-title":"Ieee Access"},{"issue":"6","key":"2176_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331174","volume":"52","author":"M Usman","year":"2019","unstructured":"Usman M, Jan MA, He X, Chen J (2019) A survey on representation learning efforts in cybersecurity domain. ACM Comput Surv (CSUR) 52(6):1\u201328","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"2176_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):1\u201322","journal-title":"Cybersecurity"},{"key":"2176_CR33","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2019.05.013","volume":"159","author":"G Caminero","year":"2019","unstructured":"Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96\u2013109","journal-title":"Comput Netw"},{"key":"2176_CR34","doi-asserted-by":"publisher","unstructured":"Li M, Tian Z, Du X, Yuan X, Shan C.,..., Guizani M (2023). Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518:165\u2013173.\u00a0https:\/\/doi.org\/10.1016\/j.neucom.2022.11.001","DOI":"10.1016\/j.neucom.2022.11.001"},{"key":"2176_CR35","doi-asserted-by":"publisher","first-page":"54035","DOI":"10.1109\/ACCESS.2020.2980573","volume":"8","author":"J Liang","year":"2020","unstructured":"Liang J, Jing T, Niu H, Wang J (2020) Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access 8:54035\u201354043","journal-title":"IEEE Access"},{"issue":"2","key":"2176_CR36","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2019.2947468","volume":"20","author":"J Yu","year":"2021","unstructured":"Yu J, Lu L, Chen Y, Zhu Y, Kong L (2021) An indirect eavesdropping attack of Keystrokes on Touch screen through Acoustic Sensing. IEEE Trans Mob Comput 20(2):337\u2013351. https:\/\/doi.org\/10.1109\/TMC.2019.2947468","journal-title":"IEEE Trans Mob Comput"},{"key":"2176_CR37","doi-asserted-by":"publisher","unstructured":"Dai X, Xiao Z, Jiang H, Alazab M, Lui JCS, Min G,..., Liu J (2023) Task offloading for cloud-assisted fog computing with dynamic service caching in enterprise management systems. IEEE Trans Ind Inform 19(1), 662\u2013672. https:\/\/doi.org\/10.1109\/TII.2022.3186641","DOI":"10.1109\/TII.2022.3186641"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02176-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02176-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02176-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T09:14:57Z","timestamp":1726737297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02176-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,2]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["2176"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02176-w","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,2]]},"assertion":[{"value":"13 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}