{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:30:33Z","timestamp":1772026233455,"version":"3.50.1"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T00:00:00Z","timestamp":1518048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T00:00:00Z","timestamp":1518048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-017-5149-4","type":"journal-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T08:54:13Z","timestamp":1518080053000},"page":"1159-1169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RETRACTED ARTICLE: Design and Implementation of a System Security Experiment Platform Based on Cloud"],"prefix":"10.1007","volume":"102","author":[{"given":"Tao","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"key":"5149_CR1","first-page":"651","volume":"274","author":"YT Ching","year":"2015","unstructured":"Ching, Y. T., & Chen, Y. M. (2015). The research of experimental state feedback mechanism based on windows API-take cloud security experimental platform for instance. Frontiers in Artificial Intelligence and Applications, 274, 651\u2013661.","journal-title":"Frontiers in Artificial Intelligence and Applications"},{"issue":"12","key":"5149_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.5120\/19882-1896","volume":"113","author":"A Priya","year":"2015","unstructured":"Priya, A., Rana, Y. K. R. Y. K., & Patel, B. P. P. B. P. (2015). Design and implementation of an algorithm to enhance cloud security. International Journal of Computer Applications, 113(12), 41\u201347.","journal-title":"International Journal of Computer Applications"},{"key":"5149_CR3","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.sbspro.2015.01.572","volume":"176","author":"TY Chen","year":"2015","unstructured":"Chen, T. Y., Wei, H. W., Cheng, Y. C., et al. (2015). Integrating an e-book software with vector graphic technology on cloud platform. Procedia\u2014Social and Behavioral Sciences, 176, 1012\u20131019.","journal-title":"Procedia\u2014Social and Behavioral Sciences"},{"issue":"11","key":"5149_CR4","doi-asserted-by":"publisher","first-page":"235","DOI":"10.14257\/ijsh.2015.9.11.25","volume":"9","author":"K Wang","year":"2015","unstructured":"Wang, K., & Ye, F. Y. (2015). Design and construction of the virtual cloud platform for the laboratory. International Journal of Smart Home, 9(11), 235\u2013262.","journal-title":"International Journal of Smart Home"},{"issue":"17","key":"5149_CR5","doi-asserted-by":"publisher","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu, Q., Cai, W., Shen, J., et al. (2016). A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Security and Communication Networks, 9(17), 4002\u20134012.","journal-title":"Security and Communication Networks"},{"issue":"15","key":"5149_CR6","doi-asserted-by":"publisher","first-page":"2766","DOI":"10.1002\/sec.1187","volume":"9","author":"W Qiang","year":"2016","unstructured":"Qiang, W., Jiang, C., Ran, L., et al. (2016). CDMCR: Multi-level fault-tolerant system for distributed applications in cloud. Security and Communication Networks, 9(15), 2766\u20132778.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"5149_CR7","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s10586-015-0509-x","volume":"19","author":"S Alqahtany","year":"2016","unstructured":"Alqahtany, S., Clarke, N., Furnell, S., et al. (2016). A forensic acquisition and analysis system for IaaS: Architectural model and experiment. Cluster Computing, 19(1), 439\u2013453.","journal-title":"Cluster Computing"}],"updated-by":[{"DOI":"10.1007\/s11277-022-10141-1","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"record-id":"42478"},{"DOI":"10.1007\/s11277-022-10141-1","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-017-5149-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5149-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5149-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T14:11:20Z","timestamp":1678457480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-017-5149-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,8]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5149"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5149-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,8]]},"assertion":[{"value":"8 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-022-10141-1","URL":"https:\/\/doi.org\/10.1007\/s11277-022-10141-1","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}