{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:57:58Z","timestamp":1771851478447,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11277-023-10524-y","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T10:28:46Z","timestamp":1687602526000},"page":"1859-1879","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Deep Learning Framework for Cloud to Protect the Virtual Machine from Malicious Events"],"prefix":"10.1007","volume":"131","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3136-079X","authenticated-orcid":false,"given":"Vinit","family":"Kumar","sequence":"first","affiliation":[]},{"family":"Shaheen","sequence":"additional","affiliation":[]},{"given":"D.","family":"Rajani","sequence":"additional","affiliation":[]},{"given":"Nageswara Rao","family":"Medikondu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"10524_CR1","doi-asserted-by":"publisher","first-page":"3487","DOI":"10.1007\/s11277-021-08280-y","volume":"117","author":"JB Dennis","year":"2021","unstructured":"Dennis, J. B., & Priya, M. S. (2021). A profile-based novel framework for detecting EDoS attacks in the cloud environment. Wireless Personal Communications, 117, 3487\u20133503. https:\/\/doi.org\/10.1007\/s11277-021-08280-y","journal-title":"Wireless Personal Communications"},{"key":"10524_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10063-y","author":"LK Vashishtha","year":"2022","unstructured":"Vashishtha, L. K., Singh, A. P., & Chatterjee, K. (2022). HIDM: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-022-10063-y","journal-title":"Wireless Personal Communications"},{"key":"10524_CR3","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s11277-020-07251-z","volume":"113","author":"R Geetha","year":"2020","unstructured":"Geetha, R., Suntheya, A. K., & Srikanth, G. U. (2020). Cloud integrated IoT enabled sensor network security: Research issues and solutions. Wireless Personal Communications, 113, 747\u2013771. https:\/\/doi.org\/10.1007\/s11277-020-07251-z","journal-title":"Wireless Personal Communications"},{"key":"10524_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-022-00617-9","author":"S Zhao","year":"2023","unstructured":"Zhao, S., Miao, J., Zhao, J., & Naghshbandi, N. (2023). A comprehensive and systematic review of the banking systems based on pay-as-you-go payment fashion and cloud computing in the pandemic era. Information Systems and e-Business Management. https:\/\/doi.org\/10.1007\/s10257-022-00617-9","journal-title":"Information Systems and e-Business Management"},{"key":"10524_CR5","doi-asserted-by":"publisher","first-page":"100002","DOI":"10.1016\/j.csa.2022.100002","volume":"1","author":"SA Sheik","year":"2023","unstructured":"Sheik, S. A., & Muniyandi, A. P. (2023). Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review. Cyber Security and Applications, 1, 100002. https:\/\/doi.org\/10.1016\/j.csa.2022.100002","journal-title":"Cyber Security and Applications"},{"key":"10524_CR6","doi-asserted-by":"publisher","first-page":"115398","DOI":"10.1016\/j.eswa.2021.115398","volume":"183","author":"EG Radhika","year":"2021","unstructured":"Radhika, E. G., & Sadasivam, G. S. (2021). Budget optimized dynamic virtual machine provisioning in hybrid cloud using fuzzy analytic hierarchy process. Expert Systems with Applications, 183, 115398. https:\/\/doi.org\/10.1016\/j.eswa.2021.115398","journal-title":"Expert Systems with Applications"},{"key":"10524_CR7","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.future.2022.11.031","volume":"141","author":"G Zhou","year":"2023","unstructured":"Zhou, G., Tian, W., & Buyya, R. (2023). Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing. Future Generation Computer Systems, 141, 414\u2013432. https:\/\/doi.org\/10.1016\/j.future.2022.11.031","journal-title":"Future Generation Computer Systems"},{"key":"10524_CR8","doi-asserted-by":"publisher","first-page":"83252","DOI":"10.1109\/ACCESS.2021.3087316","volume":"9","author":"\u00d6 Aslan","year":"2021","unstructured":"Aslan, \u00d6., Ozkan-Okay, M., & Gupta, D. (2021). Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access, 9, 83252\u201383271. https:\/\/doi.org\/10.1109\/ACCESS.2021.3087316","journal-title":"IEEE Access"},{"key":"10524_CR9","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13029","author":"AA Melvin","year":"2022","unstructured":"Melvin, A. A., Kathrine, G. J., Pasupathi, S., Shanmuganathan, V., & Naganathan, R. (2022). An AI powered system call analysis with bag of word approaches for the detection of intrusions and malware in Australian Defence Force Academy and virtual machine monitor malware attack data set. Expert Systems. https:\/\/doi.org\/10.1111\/exsy.13029","journal-title":"Expert Systems"},{"key":"10524_CR10","doi-asserted-by":"publisher","unstructured":"Dawson, J. A., McDonald, J. T., Hively, L., Andel, T. R., Yampolskiy, M., & Hubbard, C. (2018). Phase space detection of virtual machine cyber events through hypervisor-level system call analysis. In: 2018 1st International Conference on Data Intelligence and Security (ICDIS), IEEE. https:\/\/doi.org\/10.1109\/ICDIS.2018.00034","DOI":"10.1109\/ICDIS.2018.00034"},{"issue":"1","key":"10524_CR11","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s10586-018-1841-8","volume":"22","author":"H Kim","year":"2019","unstructured":"Kim, H., Kim, J., Kim, Y., Kim, I., & Kim, K. J. (2019). Design of network threat detection and classification based on machine learning on cloud computing. Cluster Computing, 22(1), 2341\u20132350. https:\/\/doi.org\/10.1007\/s10586-018-1841-8","journal-title":"Cluster Computing"},{"key":"10524_CR12","doi-asserted-by":"publisher","unstructured":"Abdullayeva, F. (2019). Malware detection in cloud computing using an image visualization technique. In: 2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT), IEEE. https:\/\/doi.org\/10.1109\/AICT47866.2019.8981727","DOI":"10.1109\/AICT47866.2019.8981727"},{"key":"10524_CR13","doi-asserted-by":"publisher","first-page":"100654","DOI":"10.1016\/j.measen.2022.100654","volume":"25","author":"S Srinivasan","year":"2023","unstructured":"Srinivasan, S., & Deepalakshmi, P. (2023). ENetRM: ElasticNet Regression Model based malicious cyber-attacks prediction in real-time server. Measurement: Sensors, 25, 100654. https:\/\/doi.org\/10.1016\/j.measen.2022.100654","journal-title":"Measurement: Sensors"},{"issue":"1","key":"10524_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-019-00437-y","volume":"19","author":"H Takase","year":"2020","unstructured":"Takase, H., Kobayashi, R., Kato, M., & Ohmura, R. (2020). A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. International Journal of Information Security, 19(1), 71\u201381. https:\/\/doi.org\/10.1007\/s10207-019-00437-y","journal-title":"International Journal of Information Security"},{"issue":"7","key":"10524_CR15","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.1007\/s11042-018-6339-0","volume":"79","author":"D Praveena","year":"2020","unstructured":"Praveena, D., & Rangarajan, P. (2020). A machine learning application for reducing the security risks in hybrid cloud networks. Multimedia Tools and Applications, 79(7), 5161\u20135173. https:\/\/doi.org\/10.1007\/s11042-018-6339-0","journal-title":"Multimedia Tools and Applications"},{"key":"10524_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109642","author":"H Zhou","year":"2023","unstructured":"Zhou, H., Zheng, Y., Jia, X., & Shu, J. (2023). Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN. Computer Networks. https:\/\/doi.org\/10.1016\/j.comnet.2023.109642","journal-title":"Computer Networks"},{"key":"10524_CR17","doi-asserted-by":"publisher","unstructured":"Basu, S., Kannayaram, G., Ramasubbareddy, S., & Venkatasubbaiah, C. (2019). Improved genetic algorithm for monitoring of virtual machines in cloud environment. Smart Intelligent Computing and Applications (pp. 319\u2013326). Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-1927-3_34","DOI":"10.1007\/978-981-13-1927-3_34"},{"issue":"1","key":"10524_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.26599\/TST.2019.9010044","volume":"26","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Chen, X., & Jiang, J. (2020). A multi-objective optimization method of initial virtual machine fault-tolerant placement for star topological data centers of cloud systems. Tsinghua Science and Technology, 26(1), 95\u2013111. https:\/\/doi.org\/10.26599\/TST.2019.9010044","journal-title":"Tsinghua Science and Technology"},{"key":"10524_CR19","doi-asserted-by":"publisher","unstructured":"Soni, J., Peddoju, S. K., Prabakar, N., & Upadhyay, H. (2021). Comparative analysis of LSTM, one-class SVM, and PCA to monitor real-time malware threats using system call sequences and virtual machine introspection. In International Conference on Communication, Computing and Electronics Systems (pp. 113\u2013127). Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-33-4909-4_9","DOI":"10.1007\/978-981-33-4909-4_9"},{"key":"10524_CR20","doi-asserted-by":"publisher","unstructured":"Ntambu, P., & Adeshina, S. A. (2021). Machine learning-based anomalies detection in cloud virtual machine resource usage. In 2021 1st International Conference on Multidisciplinary Engineering and Applied Science (ICMEAS), IEEE. https:\/\/doi.org\/10.1109\/ICMEAS52683.2021.9692308","DOI":"10.1109\/ICMEAS52683.2021.9692308"},{"key":"10524_CR21","doi-asserted-by":"publisher","first-page":"102246","DOI":"10.1016\/j.cose.2021.102246","volume":"105","author":"F Yilmaz","year":"2021","unstructured":"Yilmaz, F., Sridhar, M., Mohanty, A., Tendulkar, V., & Hamlen, K. W. (2021). A fine-grained classification and security analysis of web-based virtual machine vulnerabilities. Computers & Security, 105, 102246. https:\/\/doi.org\/10.1016\/j.cose.2021.102246","journal-title":"Computers & Security"},{"key":"10524_CR22","doi-asserted-by":"publisher","first-page":"103389","DOI":"10.1016\/j.jisa.2022.103389","volume":"72","author":"M Saleem","year":"2023","unstructured":"Saleem, M., Warsi, M. R., & Islam, S. (2023). Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. Journal of Information Security and Applications, 72, 103389. https:\/\/doi.org\/10.1016\/j.jisa.2022.103389","journal-title":"Journal of Information Security and Applications"},{"key":"10524_CR23","doi-asserted-by":"publisher","unstructured":"Zhao, W., Yue, S., Fei, M., Chen, R., & Wei, L. (2023). A new cloud computing deployment model: Proprietary cloud. Signal and Information Processing, Networking and Computers: Proceedings of the 10th International Conference on Signal and Information Processing, Networking and Computers (ICSINC) (pp. 130\u2013137). Singapore: Springer. https:\/\/doi.org\/10.1007\/978-981-19-9968-0_16","DOI":"10.1007\/978-981-19-9968-0_16"},{"key":"10524_CR24","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.aej.2022.10.056","volume":"64","author":"M Ali","year":"2023","unstructured":"Ali, M., Jung, L. T., Sodhro, A. H., Laghari, A. A., Belhaouari, S. B., & Gillani, Z. (2023). A Confidentiality-based data classification-as-a-Service (C2aaS) for cloud security. Alexandria Engineering Journal, 64, 749\u2013760. https:\/\/doi.org\/10.1016\/j.aej.2022.10.056","journal-title":"Alexandria Engineering Journal"},{"issue":"12","key":"10524_CR25","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi, O., Moustafa, N., Turnbull, B., & Choo, K. K. (2020). A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet of Things Journal, 8(12), 9463\u20139472. https:\/\/doi.org\/10.1109\/JIOT.2020.2996590","journal-title":"IEEE Internet of Things Journal"},{"key":"10524_CR26","doi-asserted-by":"publisher","first-page":"108394","DOI":"10.1016\/j.comnet.2021.108394","volume":"198","author":"D Tian","year":"2021","unstructured":"Tian, D., Ying, Q., Jia, X., Ma, R., Hu, C., & Liu, W. (2021). MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Computer Networks, 198, 108394. https:\/\/doi.org\/10.1016\/j.comnet.2021.108394","journal-title":"Computer Networks"},{"key":"10524_CR27","doi-asserted-by":"crossref","unstructured":"Alsarhan, A., Al-Ghuwairi, A. R., Alshdaifat, E., & Idhaim, H. (2022). A novel scheme for malicious nodes detection in cloud markets based on fuzzy logic technique. International Journal of Interactive Mobile Technologies, 16(3).","DOI":"10.3991\/ijim.v16i03.27933"},{"key":"10524_CR28","doi-asserted-by":"publisher","first-page":"107095","DOI":"10.1016\/j.knosys.2021.107095","volume":"226","author":"T Panker","year":"2021","unstructured":"Panker, T., & Nissim, N. (2021). Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowledge-Based Systems, 226, 107095. https:\/\/doi.org\/10.1016\/j.knosys.2021.107095","journal-title":"Knowledge-Based Systems"},{"key":"10524_CR29","doi-asserted-by":"publisher","first-page":"102661","DOI":"10.1016\/j.jisa.2020.102661","volume":"55","author":"X Gao","year":"2020","unstructured":"Gao, X., Hu, C., Shan, C., Liu, B., Niu, Z., & Xie, H. (2020). Malware classification for the cloud via semi-supervised transfer learning. Journal of Information Security and Applications, 55, 102661. https:\/\/doi.org\/10.1016\/j.jisa.2020.102661","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"10524_CR30","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11416-022-00425-2","volume":"18","author":"S Kumar","year":"2022","unstructured":"Kumar, S. (2022). An effective ransomware detection approach in a cloud environment using volatile memory features. Journal of Computer Virology and Hacking Techniques, 18(4), 407\u2013424. https:\/\/doi.org\/10.1007\/s11416-022-00425-2","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"10524_CR31","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/s12083-021-01281-5","volume":"15","author":"RN Vaza","year":"2022","unstructured":"Vaza, R. N., Prajapati, R., Rathod, D., & Vaghela, D. (2022). Developing a novel methodology for virtual machine introspection to classify unknown malware functions. Peer-to-Peer Networking and Applications, 15, 793\u2013810. https:\/\/doi.org\/10.1007\/s12083-021-01281-5","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10524_CR32","doi-asserted-by":"publisher","first-page":"102836","DOI":"10.1016\/j.adhoc.2022.102836","volume":"131","author":"P Mishra","year":"2022","unstructured":"Mishra, P., Gupta, A., Aggarwal, P., & Pilli, E. S. (2022). vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers. Ad Hoc Networks, 131, 102836. https:\/\/doi.org\/10.1016\/j.adhoc.2022.102836","journal-title":"Ad Hoc Networks"},{"key":"10524_CR33","doi-asserted-by":"publisher","first-page":"181916","DOI":"10.1109\/ACCESS.2020.3028690","volume":"8","author":"A Bhardwaj","year":"2020","unstructured":"Bhardwaj, A., Mangat, V., & Vig, R. (2020). Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud. IEEE Access, 8, 181916\u2013181929. https:\/\/doi.org\/10.1109\/ACCESS.2020.3028690","journal-title":"IEEE Access"},{"issue":"1","key":"10524_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-021-01570-y","volume":"46","author":"M Reddy","year":"2021","unstructured":"Reddy, M., & Rajput, D. S. (2021). Ternary-based feature level extraction for anomaly detection in semantic graphs: An optimal feature selection basis. S\u0101dhan\u0101, 46(1), 1\u20136. https:\/\/doi.org\/10.1007\/s12046-021-01570-y","journal-title":"S\u0101dhan\u0101"},{"issue":"5","key":"10524_CR35","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.cad.2004.08.002","volume":"37","author":"P Pal","year":"2005","unstructured":"Pal, P., Tigga, A. M., & Kumar, A. (2005). Feature extraction from large CAD databases using genetic algorithm. Computer-Aided Design, 37(5), 545\u2013558. https:\/\/doi.org\/10.1016\/j.cad.2004.08.002","journal-title":"Computer-Aided Design"},{"issue":"4","key":"10524_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00687-5","volume":"2","author":"H Chantar","year":"2021","unstructured":"Chantar, H., Tubishat, M., Essgaer, M., & Mirjalili, S. (2021). Hybrid binary dragonfly algorithm with simulated annealing for feature selection. SN Computer Science, 2(4), 1\u20131. https:\/\/doi.org\/10.1007\/s42979-021-00687-5","journal-title":"SN Computer Science"},{"key":"10524_CR37","doi-asserted-by":"publisher","unstructured":"Devarakonda, N., Anandarao, S., & Kamarajugadda, R. (2021). Detection of intruder using the improved dragonfly optimization algorithm. IOP Conference Series: Materials Science and Engineering (pp. 012011). https:\/\/doi.org\/10.1088\/1757-899X\/1074\/1\/012011","DOI":"10.1088\/1757-899X\/1074\/1\/012011"},{"key":"10524_CR38","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.sp2022no2.7","author":"J Ragaventhiran","year":"2022","unstructured":"Ragaventhiran, J., Vigneshwaran, P., Mallikarjun, M. K., Syed, T. A., Prabu, R., & Prisma, M. (2022). An unsupervised malware detection system for windows based system call sequences. Malaysian Journal of Computer Science. https:\/\/doi.org\/10.22452\/mjcs.sp2022no2.7","journal-title":"Malaysian Journal of Computer Science"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10524-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10524-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10524-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T17:33:10Z","timestamp":1689787990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10524-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["10524"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10524-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"21 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"For this type of analysis formal consent is not needed.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}