{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:18:42Z","timestamp":1768342722572,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00183-9","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T18:27:00Z","timestamp":1753208820000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing public cloud resilience: an analytical review of detection and mitigation strategies against economic denial of sustainability attacks"],"prefix":"10.1007","volume":"5","author":[{"given":"Zubaidi Maytham","family":"Sahar Saeed","sequence":"first","affiliation":[]},{"given":"Anazida Binti","family":"Zainal","sequence":"additional","affiliation":[]},{"given":"Fuad A.","family":"Ghaleb","sequence":"additional","affiliation":[]},{"given":"Bander Ali Saleh","family":"Al-rimy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,22]]},"reference":[{"key":"183_CR1","doi-asserted-by":"publisher","first-page":"101126","DOI":"10.1016\/j.iot.2024.101126","volume":"25","author":"ADDINENREFLIST Qazi","year":"2024","unstructured":"Qazi ADDINENREFLIST, Kwak F, Khan D, Ali FG, Khan F. Service level agreement in cloud computing: taxonomy, prospects, and challenges. Internet Things. 2024;25:101126.","journal-title":"Internet Things"},{"key":"183_CR2","doi-asserted-by":"crossref","unstructured":"Soni D, Kumar N. Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy. J Netw Comput Appl. 2022;205:103419.","DOI":"10.1016\/j.jnca.2022.103419"},{"issue":"5","key":"183_CR3","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1177\/0308518X221094028","volume":"54","author":"D Narayan","year":"2022","unstructured":"Narayan D. Platform capitalism and cloud infrastructure: theorizing a hyper-scalable computing regime. Environ Plann A: Econ Space. 2022;54(5):911\u201329.","journal-title":"Environ Plann A: Econ Space"},{"issue":"4","key":"183_CR4","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.telpol.2012.04.011","volume":"37","author":"N Kshetri","year":"2013","unstructured":"Kshetri N. Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecomm Policy. 2013;37(4):372\u201386.","journal-title":"Telecomm Policy"},{"key":"183_CR5","doi-asserted-by":"crossref","unstructured":"Vinoth S, Vemula HL, Haralayya B, Mamgain P, Hasan MF, Naved M. Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings. 2022;51:2172\u20135.","DOI":"10.1016\/j.matpr.2021.11.121"},{"key":"183_CR6","unstructured":"Dr. MRC, Sheel Ghule MKP. Cloud computing in banking services. Int J Sci Res Publications. 2014;4(6), ISSN 2250-3153."},{"key":"183_CR7","unstructured":"Alqahtani KS, Albalawi AM, Frikha M. REVIEWING OF CYBERSECURITY THREATS, ATTACKS, AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENT. J Theoretical Appl. Inform. Technol. 2023;101(6):2058\u20132066."},{"issue":"3","key":"183_CR8","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1007\/s13369-014-1548-y","volume":"40","author":"F Al-Haidari","year":"2015","unstructured":"Al-Haidari F, Sqalli M, Salah K. Evaluation of the impact of EDoS attacks against cloud computing services. Arab J Sci Eng. 2015;40(3):773\u201385.","journal-title":"Arab J Sci Eng"},{"issue":"2","key":"183_CR9","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/JSYST.2015.2414822","volume":"11","author":"M Ficco","year":"2017","unstructured":"Ficco M, Palmieri F. Introducing fraudulent energy consumption in cloud infrastructures: A new generation of Denial-of-Service attacks. IEEE Syst J. 2017;11(2):460\u201370.","journal-title":"IEEE Syst J"},{"key":"183_CR10","unstructured":"Charlie. We are under attack: Greatfire.Org; 2015 [Available from: https:\/\/en.greatfire.org\/blog\/2015\/mar\/we-are-under-attack"},{"key":"183_CR11","doi-asserted-by":"crossref","unstructured":"Wang H, Xi Z, Li F, Chen S, editors. WebTrap: A dynamic defense scheme against economic denial of sustainability attacks. 2017 IEEE Conference on Communications and Security N, Singh (CNS), PMS.2017: Publisher: IEEE.","DOI":"10.1109\/CNS.2017.8228640"},{"key":"183_CR12","doi-asserted-by":"crossref","unstructured":"Singh PM, S.; Rehman, S.U. A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing achitecture. In Proceedings of the IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO),; 8-10 October;Noida, India2014. pp. 1\u20134.","DOI":"10.1109\/ICRITO.2014.7014767"},{"key":"183_CR13","doi-asserted-by":"crossref","unstructured":"Chowdhury FZ, Kiah LBM, Ahsan MAM, Idris MYIB, editors. Economic denial of sustainability (EDoS) mitigation approaches in cloud: Analysis and open challenges. 2017 International Conference on Electrical Engineering and Computer Science (ICECOS); 2017 22-23 Aug. 2017.","DOI":"10.1109\/ICECOS.2017.8167135"},{"key":"183_CR14","unstructured":"Singh P, Rehman SU, Manickam S. Comparative analysis of state-of-the-art EDoS mitigation techniques in cloud computing environments. ArXiv Preprint arXiv:190513447. 2019. (Volume 1)"},{"key":"183_CR15","doi-asserted-by":"crossref","unstructured":"Nautiyal S, Wadhwa S, editors. A Comparative Approach to Mitigate Economic Denial of Sustainability (EDoS) in a Cloud Environment. 2019 4th International Conference on Information Systems and Computer Networks (ISCON); 2019 21-22 Nov. 2019.","DOI":"10.1109\/ISCON47742.2019.9036257"},{"key":"183_CR16","doi-asserted-by":"crossref","unstructured":"Sqalli MH, Al-Haidari F, Salah K, editors. EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing. 2011 Fourth IEEE International Conference on Utility and Cloud Computing; 2011 5-8 Dec. 2011.","DOI":"10.1109\/UCC.2011.17"},{"key":"183_CR17","doi-asserted-by":"crossref","unstructured":"Al-Haidari F, Sqalli MH, Salah K, editors. Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications; 2012 25-27 June 2012.","DOI":"10.1109\/TrustCom.2012.146"},{"key":"183_CR18","unstructured":"Kumar MN, Sujatha P, Kalva V, Nagori R, Katukojwala AK, Kumar M, editors. Mitigating Economic Denial of Sustainability (EDoS) in Cloud Computing Using In-cloud Scrubber Service. 2012 Fourth International Conference on Computational Intelligence and Communication Networks; 2012 3-5 Nov. 2012."},{"key":"183_CR19","doi-asserted-by":"crossref","unstructured":"VivinSandar S, Shenai S. Economic denial of sustainability (EDOS) in cloud services using HTTP- and XML-based DDoS attacks. For example, Int J Comput Appl. 2012;41(20):11\u201316.","DOI":"10.5120\/5807-8063"},{"issue":"2","key":"183_CR20","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s41635-018-0061-2","volume":"3","author":"H Abbasi","year":"2019","unstructured":"Abbasi H, Ezzati-Jivan N, Bellaiche M, Talhi C, Dagenais MR. Machine learning-based EDoS attack detection technique using execution trace analysis. J Hardw Syst Secur. 2019;3(2):164\u201376.","journal-title":"J Hardw Syst Secur"},{"key":"183_CR21","unstructured":"Mary IM, Kavitha P, Priyadharshini M, Ramana VS. Secure cloud computing environment against ddos and edos attacks. 2014."},{"key":"183_CR22","doi-asserted-by":"crossref","unstructured":"Thaper R, Verma A, editors. Adaptive Pattern Attack Recognition technique (APART) against EDoS attacks in Cloud Computing. 2015 Third International Conference on Image Information Processing (ICIIP); 2015 21-24 Dec. 2015.","DOI":"10.1109\/ICIIP.2015.7414735"},{"key":"183_CR23","doi-asserted-by":"crossref","unstructured":"Ko HJ, Wang GY, Horng G, -J S W, editors. A Chaotic Attack Offering with Improving Mechanism in Economic Denial of Sustainability. 2020 International Conference on Pervasive Artificial Intelligence (ICPAI); 2020 3-5 Dec. 2020.","DOI":"10.1109\/ICPAI51961.2020.00015"},{"key":"183_CR24","doi-asserted-by":"publisher","first-page":"107825","DOI":"10.1016\/j.comnet.2021.107825","volume":"187","author":"SQ Ali Shah","year":"2021","unstructured":"Ali Shah SQ, Zeeshan Khan F, Ahmad M. The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network. Comput Netw. 2021;187:107825.","journal-title":"Comput Netw"},{"key":"183_CR25","doi-asserted-by":"crossref","unstructured":"Masood M, Anwar Z, Raza SA, Hur MA, editors. EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. INMIC; 2013 19-20 Dec. 2013.","DOI":"10.1109\/INMIC.2013.6731321"},{"key":"183_CR26","doi-asserted-by":"crossref","unstructured":"Rao RG, Nene MJ, editors. SEDoS-7: A proactive mitigation approach against EDoS attacks in cloud computing. 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET); 2017 22-24 March 2017.","DOI":"10.1109\/WiSPNET.2017.8299905"},{"issue":"21","key":"183_CR27","doi-asserted-by":"publisher","first-page":"10249","DOI":"10.3390\/app112110249","volume":"11","author":"C-N Nhu","year":"2021","unstructured":"Nhu C-N, Park M. Two-Phase deep Learning-Based EDoS detection system. Appl Sci. 2021;11(21):10249.","journal-title":"Appl Sci"},{"key":"183_CR28","doi-asserted-by":"crossref","unstructured":"Somani G, Gaur MS, Sanghi D, editors. DDoS\/EDoS attack in cloud: affecting everyone out there! Proceedings of the 8th International Conference on Security of Information and Networks; 2015.","DOI":"10.1145\/2799979.2800005"},{"issue":"20","key":"183_CR29","doi-asserted-by":"publisher","first-page":"2500","DOI":"10.3390\/electronics10202500","volume":"10","author":"V Ta","year":"2021","unstructured":"Ta V, Park M, MAN-EDoS:. A multihead attention network for the detection of economic denial of sustainability attacks. Electronics. 2021;10(20):2500.","journal-title":"Electronics"},{"issue":"9","key":"183_CR30","first-page":"51","volume":"8","author":"PS Bawa","year":"2017","unstructured":"Bawa PS, Rehman SU, Manickam S. Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int J Adv Comput Sci Appl. 2017;8(9):51\u20138.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"183_CR31","doi-asserted-by":"crossref","unstructured":"Baig ZA, Binbeshr F, editors. Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks against Cloud Infrastructures. 2013 International Conference on Cloud Computing and Big Data; 2013 16-19 Dec. 2013.","DOI":"10.1109\/CLOUDCOM-ASIA.2013.51"},{"key":"183_CR32","unstructured":"Khor SH, Nakao A. On-demand cloud_based eddos mitigation mechanism. HotDep (Fifth Workshop on Hot Topics in system dependability 2009."},{"key":"183_CR33","doi-asserted-by":"crossref","unstructured":"Alosaimi W, Al-Begain K, editors. An Enhanced Economical Denial of Sustainability Mitigation System for the Cloud. 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies; 2013 25-27 Sept. 2013.","DOI":"10.1109\/NGMAST.2013.13"},{"issue":"3","key":"183_CR34","first-page":"420","volume":"9","author":"W Alosaimi","year":"2017","unstructured":"Alosaimi W, Zak M, Al-Begain K, Alroobaea R, Masud M. Economic denial of sustainability attacks mitigation in the cloud. Int J Communication Networks Inform Secur. 2017;9(3):420\u201331.","journal-title":"Int J Communication Networks Inform Secur"},{"key":"183_CR35","unstructured":"Amazon. CloudWatch Developer Guide 2015 [Available from: https:\/\/s3.cn-north-1.amazonaws.com.cn\/aws-dam-prod\/china\/pdf\/acw-dg.pdf"},{"key":"183_CR36","doi-asserted-by":"crossref","unstructured":"Rao BB, Bulla S, Rao KG, Chandan K, editors. HRF (HTTP request filtering): a new detection mechanism of EDOS attack on cloud. 2019 International Carnahan Conference on Security Technology (ICCST); 2019: IEEE.","DOI":"10.1109\/CCST.2019.8888431"},{"issue":"3","key":"183_CR37","first-page":"790","volume":"8","author":"A Shawahna","year":"2020","unstructured":"Shawahna A, Abu-Amara M, Mahmoud ASH, Osais Y. EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans Cloud Comput. 2020;8(3):790\u2013804.","journal-title":"IEEE Trans Cloud Comput"},{"key":"183_CR38","doi-asserted-by":"crossref","unstructured":"Koduru A, Neelakantam T, B MS S, editors. Detection of Economic Denial of Sustainability Using Time Spent on a Web Page in Cloud. 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM); 2013 16-18 Oct. 2013.","DOI":"10.1109\/CCEM.2013.6684433"},{"key":"183_CR39","doi-asserted-by":"crossref","unstructured":"Dinh PT, Park M, editors. Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud. 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC); 2020 20-23 April 2020.","DOI":"10.1109\/FMEC49853.2020.9144972"},{"key":"183_CR40","doi-asserted-by":"crossref","unstructured":"Dinh PT, Park M, editors. Economic Denial of Sustainability (EDoS) Detection using GANs in SDN-based Cloud. 2020 IEEE Eighth International Conference on Communications and Electronics (ICCE); 2021 13-15 Jan. 2021.","DOI":"10.1109\/ICCE48956.2021.9352082"},{"key":"183_CR41","doi-asserted-by":"publisher","first-page":"35057","DOI":"10.1109\/ACCESS.2021.3061601","volume":"9","author":"PT Dinh","year":"2021","unstructured":"Dinh PT, Park MR-EDS. Robust economic denial of sustainability detection in an SDN-Based cloud through stochastic recurrent neural network. IEEE Access. 2021;9:35057\u201374.","journal-title":"IEEE Access"},{"key":"183_CR42","first-page":"102672","volume":"56","author":"A Agarwal","year":"2021","unstructured":"Agarwal A, Prasad A, Rustogi R, Mishra S. Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach. J Inform Secur Appl. 2021;56:102672.","journal-title":"J Inform Secur Appl"},{"issue":"3","key":"183_CR43","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.icte.2020.12.004","volume":"7","author":"V Kanimozhi","year":"2021","unstructured":"Kanimozhi V, Jacob TP. Artificial intelligence outflanks all other machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express. 2021;7(3):366\u201370.","journal-title":"ICT Express"},{"key":"183_CR44","doi-asserted-by":"crossref","unstructured":"Ribin Jones S, Kumar N, editors. EDoS-BARRICADE: A Cloud-Centric Approach to Detect, Segregate and Mitigate EDoS Attacks. International Conference on Communication, Computing and Electronics Systems; 2021: Springer.","DOI":"10.1007\/978-981-33-4909-4_44"},{"key":"183_CR45","doi-asserted-by":"crossref","unstructured":"Ta QV, Park M, editors. Economic Denial of Sustainability (EDoS) attack detection by attention on flow-based in Software Defined Network (SDN). 2022 International Conference on Information Networking (ICOIN); 2022 12-15 Jan. 2022.","DOI":"10.1109\/ICOIN53446.2022.9687229"},{"issue":"1","key":"183_CR46","doi-asserted-by":"publisher","first-page":"e6543","DOI":"10.1002\/cpe.6543","volume":"34","author":"J Britto Dennis","year":"2022","unstructured":"Britto Dennis J, Shanmuga Priya M. Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud. Concurrency Computation: Pract Experience. 2022;34(1):e6543.","journal-title":"Concurrency Computation: Pract Experience"},{"key":"183_CR47","doi-asserted-by":"crossref","unstructured":"Idziorek J, Tannian M, Jacobson D, editors. Attribution of fraudulent resource consumption in the cloud. 2012 IEEE fifth international conference on cloud computing; 2012: IEEE.","DOI":"10.1109\/CLOUD.2012.23"},{"key":"183_CR48","doi-asserted-by":"crossref","unstructured":"Karami M, Chen S, editors. Attribution of economic denial of sustainability attacks in public clouds. International Conference on Security and Privacy in Communication Systems; 2016: Springer.","DOI":"10.1007\/978-3-319-59608-2_22"},{"key":"183_CR49","doi-asserted-by":"crossref","unstructured":"Idziorek J, Tannian M, editors. Exploiting Cloud Utility Models for Profit and Ruin. 2011 IEEE 4th International Conference on Cloud Computing; 2011 4-9 July 2011.","DOI":"10.1109\/CLOUD.2011.45"},{"issue":"12","key":"183_CR50","doi-asserted-by":"publisher","first-page":"649","DOI":"10.3390\/e19120649","volume":"19","author":"MA Sotelo Monge","year":"2017","unstructured":"Sotelo Monge MA, Maestre Vidal J, Garc\u00eda Villalba LJ. Entropy-based economic denial of sustainability detection. Entropy. 2017;19(12):649.","journal-title":"Entropy"},{"key":"183_CR51","doi-asserted-by":"crossref","unstructured":"Zekri M, El Kafhali S, Hanini M, Aboutabit N. Mitigating economic denial of sustainability attacks to secure cloud computing environments. Trans Mach Learn Artif Intell. 2017;5(4):473-481.","DOI":"10.14738\/tmlai.54.3220"},{"key":"183_CR52","doi-asserted-by":"crossref","unstructured":"Arora Y, editor. Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks. 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC); 2018 15-17 Dec. 2018.","DOI":"10.1109\/ICSCCC.2018.8703328"},{"issue":"06","key":"183_CR53","doi-asserted-by":"publisher","first-page":"1850049","DOI":"10.1142\/S1793962318500496","volume":"9","author":"S Bhingarkar","year":"2018","unstructured":"Bhingarkar S, Shah D. FLNL: fuzzy entropy and Lion neural learner for EDoS attack mitigation in cloud computing. Int J Model Simul Sci Comput. 2018;9(06):1850049.","journal-title":"Int J Model Simul Sci Comput"},{"key":"183_CR54","doi-asserted-by":"crossref","unstructured":"Rustogi R, Agarwal A, Prasad A, Saurabh S, editors. Machine Learning Based Web-Traffic Analysis for Detection of Fraudulent Resource Consumption Attack in Cloud. 2019 IEEE\/WIC\/ACM international conference on web intelligence (WI); 2019: IEEE.","DOI":"10.1145\/3350546.3352567"},{"key":"183_CR55","doi-asserted-by":"crossref","unstructured":"Courtney L, Li X, Xu R, Coffman J, editors. Data Science Techniques to Detect Fraudulent Resource Consumption in the Cloud. 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). 2021: Publisher: IEEE.","DOI":"10.1109\/CCWC51732.2021.9375938"},{"key":"183_CR56","doi-asserted-by":"crossref","unstructured":"Ribin Jones S, Kumar N. An efficient EDoS-DOME system in cloud computing using obfuscated IP spoofing techniques and RCDH-ENN detection techniques. Appl. Nanosci. 2021;13:1703\u20131","DOI":"10.1007\/s13204-021-02153-3"},{"key":"183_CR57","doi-asserted-by":"crossref","unstructured":"Lalropuia K, Khaitan V. Game theoretic modeling of economic denial of sustainability (EDoS) attack in cloud computing. Probab Eng Inf Sci. 2021;36:1\u201325.","DOI":"10.1017\/S0269964821000334"},{"issue":"3","key":"183_CR58","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1007\/s10586-021-03257-9","volume":"24","author":"K Lalropuia","year":"2021","unstructured":"Lalropuia K. Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach. Cluster Comput. 2021;24(3):2177\u201391.","journal-title":"Cluster Comput"},{"key":"183_CR59","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.comcom.2021.11.008","volume":"182","author":"SQA Shah","year":"2022","unstructured":"Shah SQA, Khan FZ, Ahmad M. Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. Comput Commun. 2022;182:198\u2013211.","journal-title":"Comput Commun"},{"issue":"1","key":"183_CR60","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.1109\/TCE.2023.3347690","volume":"70","author":"JK Samriya","year":"2023","unstructured":"Samriya JK, Kumar S, Kumar M, Xu M, Wu H, Gill SS. Blockchain and reinforcement neural network for trusted cloud-enabled IoT network. IEEE Trans Consum Electron. 2023;70(1):2311\u201322.","journal-title":"IEEE Trans Consum Electron"},{"key":"183_CR61","doi-asserted-by":"crossref","unstructured":"Gill, S. S., Golec, M., Hu, J., Xu, M., Du, J., Wu, H.,\u2026 Uhlig, S. Edge AI:A taxonomy, systematic review and future directions. Cluster Computing, 2025;28(1):1\u201353.","DOI":"10.1007\/s10586-024-04686-y"},{"key":"183_CR62","doi-asserted-by":"crossref","unstructured":"Samriya JK, Kumar S, Kumar M, Wu H, Gill SS. (2024). Machine learning-based network intrusion detection optimization for cloud computing environments. IEEE Trans Consum Electron. 70(4)","DOI":"10.1109\/TCE.2024.3458810"},{"key":"183_CR63","doi-asserted-by":"crossref","unstructured":"Yadav, A. S., Kumar, S., Karetla, G. R., Cotrina-Aliaga, J. C., Arias-Gonz\u00e1les, J.L., Kumar, V.,\u2026 Tatkar, N. S. A feature extraction using probabilistic neural network and BTFSC-net model with deep learning for brain tumor classification. Journal of Imaging, 2022;9(1):10.","DOI":"10.3390\/jimaging9010010"},{"key":"183_CR64","doi-asserted-by":"crossref","unstructured":"Kumar, S., Kumar, S., Ranjan, N., Tiwari, S., Kumar, T. R., Goyal, D.,\u2026 Rafsanjani,M. K. Digital watermarking-based cryptosystem for cloud resource provisioning. International Journal of Cloud Applications and Computing (IJCAC), 2022;12(1):1\u201320.","DOI":"10.4018\/IJCAC.311033"},{"issue":"5","key":"183_CR65","first-page":"2297","volume":"14","author":"S Kumar","year":"2022","unstructured":"Kumar S, Samriya JK, Yadav AS, Kumar M. To improve scalability with boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment. Int J Inform Technol. 2022;14(5):2297\u2013307.","journal-title":"Int J Inform Technol"},{"key":"183_CR66","doi-asserted-by":"crossref","unstructured":"Kumar S, Srivastava S, Kumar S, Saini AK, Verma N, Kapila D. Filtering big data with an optimized hybrid algorithm for IoT-based data selection. J Intell Syst Internet Things, 2024;12(2):150\u2013162.","DOI":"10.54216\/JISIoT.120211"},{"issue":"1","key":"183_CR67","first-page":"88","volume":"12","author":"N Kumar","year":"2022","unstructured":"Kumar N, Kumar S. A salp swarm optimization for dynamic resource management to improve quality of service in cloud computing and IoT environment. Int J Sens Wirel Commun Control. 2022;12(1):88\u201394.","journal-title":"Int J Sens Wirel Commun Control"},{"issue":"3","key":"183_CR68","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4018\/IJAEC.2018070103","volume":"9","author":"N Kumar","year":"2018","unstructured":"Kumar N, Kumar S. Virtual machine placement using statistical mechanism in cloud computing environment. Int J Appl Evolutionary Comput (IJAEC). 2018;9(3):23\u201331.","journal-title":"Int J Appl Evolutionary Comput (IJAEC)"},{"key":"183_CR69","unstructured":"Nadu T, Pradesh A. A holistic mathematical cyber security model in fog resource management in computing environments."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00183-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00183-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00183-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T17:49:42Z","timestamp":1757267382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00183-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,22]]},"references-count":69,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["183"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00183-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,22]]},"assertion":[{"value":"27 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All participants were informed about the purpose of the study and provided informed consent to participate. In addition, participants gave their consent for publication of the findings arising from their data.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"79"}}