{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:41:41Z","timestamp":1742384501349},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7363764","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:36:21Z","timestamp":1451338581000},"page":"271-278","source":"Crossref","is-referenced-by-count":6,"title":["ATOM: Automated tracking, orchestration and monitoring of resource usage in infrastructure as a service systems"],"prefix":"10.1109","author":[{"given":"Min","family":"Du","sequence":"first","affiliation":[]},{"given":"Feifei","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059967"},{"year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1979.10489779"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576212"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-1524(00)00022-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.45"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.93"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-010-0140-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"Infrastructure as a service security: Challenges and solutions","author":"dawoud","year":"2010","journal-title":"INFOS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.71"},{"key":"ref8","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","article-title":"In-network pca and anomaly detection","author":"huang","year":"2006","journal-title":"NIPS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973068.119"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07363764.pdf?arnumber=7363764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:21:28Z","timestamp":1490401288000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7363764","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}