{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:47:13Z","timestamp":1730195233347,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/afrcon.2013.6757727","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T22:15:04Z","timestamp":1394230504000},"page":"1-5","source":"Crossref","is-referenced-by-count":14,"title":["A collaborative intrusion detection and Prevention System in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Hassani","family":"Mohamed","sequence":"first","affiliation":[]},{"given":"Lebbat","family":"Adil","sequence":"additional","affiliation":[]},{"given":"Tallal","family":"Saida","sequence":"additional","affiliation":[]},{"given":"Medromi","family":"Hicham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IDPS An Integrated Intrusion Handling Model for Cloud Computing Environment","year":"2012","author":"alsafi","key":"15"},{"key":"13","article-title":"Intrusion detection system (NIDS) in cloud computing","author":"modi","year":"2012","journal-title":"International Conference on Communication Computing & Security (ICCCS-2012)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"journal-title":"IDPS An Integrated Intrusion Handling Model for Cloud Computing Environment","year":"2012","author":"alsafi","key":"11"},{"key":"12","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"parag","year":"2012","journal-title":"Int J Sci Tech Res"},{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2009","author":"lyon","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.76"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"10","article-title":"An intrusion detection and prevention system in cloud computing: A systematic review","author":"patel","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"7","article-title":"E?tude de l'impact des attaques distribue?es et multi-chemins sur les solutions de se?curite? re?seaux","author":"riquet","year":"2012","journal-title":"2012 MajecSTIC"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.76"},{"journal-title":"Detection and characterization of port scan attacks","year":"2003","author":"lee","key":"5"},{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2009","author":"lyon","key":"4"},{"key":"9","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"parag","year":"2012","journal-title":"Int J Sci Tech Res"},{"key":"8","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"parag","year":"2012","journal-title":"Int J Sci Tech Res"}],"event":{"name":"AFRICON 2013","start":{"date-parts":[[2013,9,9]]},"location":"Pointe-Aux-Piments, Mauritius","end":{"date-parts":[[2013,9,12]]}},"container-title":["2013 Africon"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746871\/6757586\/06757727.pdf?arnumber=6757727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:30:40Z","timestamp":1490304640000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6757727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2013.6757727","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}