{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:36:13Z","timestamp":1769207773483,"version":"3.49.0"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100013317","name":"Key Research and Development Program of Shanxi Province","doi-asserted-by":"crossref","award":["201903D121119"],"award-info":[{"award-number":["201903D121119"]}],"id":[{"id":"10.13039\/501100013317","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Postgraduate Education Innovation Project of Shanxi Province","award":["2019SY495"],"award-info":[{"award-number":["2019SY495"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2981373","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T21:04:29Z","timestamp":1584479069000},"page":"60218-60231","source":"Crossref","is-referenced-by-count":36,"title":["A Many Objective-Based Feature Selection Model for Anomaly Detection in Cloud Environment"],"prefix":"10.1109","volume":"8","author":[{"given":"Zhixia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jie","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3308-5656","authenticated-orcid":false,"given":"Jiangjiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xingjuan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Liping","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2443001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2433266"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2307319"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2776226"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2204264"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5464"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2927733"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2019.097636"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.103963"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905041"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.098405"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2012.09.008"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.099186"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2019.098745"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948095"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2654301"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.001"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2420112"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CEEICT.2018.8628105"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.892759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875045"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.05.011"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3390\/sym12010007","article-title":"Effects of machine learning approach in flow-based anomaly detection on software-defined networking","volume":"12","author":"dey","year":"2020","journal-title":"Symmetry"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2015.7045674"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-137-7_6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2549267"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.10.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014715"},{"key":"ref20","article-title":"Outlier detection for high-dimensional data streams","author":"ji","year":"2015","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jpdc.2019.03.010","article-title":"Malicious code detection based on CNNs and multi-objective algorithm","volume":"129","author":"cui","year":"2019","journal-title":"J Parallel Distrib Comput"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2016.1401"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04921-7_54"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2008.020954"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.191"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01503-7"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2015.06.007"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01537-x"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"ref57","first-page":"16","article-title":"Alignment by maximization of mutual information","volume":"24","author":"viola","year":"2002","journal-title":"Proc IEEE Int Conf Comput Vis"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.1007\/s00500-015-1942-8","article-title":"Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems","volume":"21","author":"bostani","year":"2017","journal-title":"Soft Comput"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2018.10017540"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.jpdc.2017.12.014","article-title":"Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things","volume":"132","author":"cui","year":"2019","journal-title":"J Parallel Distrib Comput"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9729-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.10019886"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804323"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2006.34"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2019.102692"},{"key":"ref12","first-page":"65","article-title":"Computer security threat monitoring and surveillance","volume":"11","author":"anderson","year":"1980"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS.2010.5656789"},{"key":"ref14","first-page":"12","article-title":"Intrusion detection in the cloud","author":"roschke","year":"2009","journal-title":"Proc 8th IEEE Int Conf Dependable Autonomic Secure Comput (DASC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5479"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-004-5581-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.135"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11434-009-0261-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2012.04219"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2007.33"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964537"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1187-7"},{"key":"ref49","article-title":"Feature selection based on multi-objective evolutionary algorithm for intrusion detection","author":"jiang","year":"2010","journal-title":"Comput Eng Appl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2917776"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.10021706"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5478"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842257"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2019.102690"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref43","article-title":"Personalized recommendation system based on collaborative filtering for IoT scenarios","author":"cui","year":"0","journal-title":"IEEE Trans Services Comput"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09039600.pdf?arnumber=9039600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T19:00:00Z","timestamp":1643310000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9039600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2981373","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}