{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:37:52Z","timestamp":1758267472041,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664371","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:48:02Z","timestamp":1385570882000},"page":"75-79","source":"Crossref","is-referenced-by-count":32,"title":["A neural network based distributed intrusion detection system on cloud platform"],"prefix":"10.1109","author":[{"given":"Zhe","family":"Li","sequence":"first","affiliation":[]},{"given":"Weiqing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lingfeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"What's New about Cloud Computing Security?","year":"0","author":"chen","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.123"},{"key":"11","first-page":"18","article-title":"A survey of modern advances in network intrusion detection","author":"kotov","year":"2011","journal-title":"13th International Workshop on Computer Science and Information Technologies (CSIT'2011)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.153"},{"key":"3","first-page":"12","article-title":"A study of using neural network for anomaly and misuse detection","author":"ghosh","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"2","first-page":"397","article-title":"Security architectures for cloud computing","volume":"46","author":"okuhara","year":"2010","journal-title":"FUJITSU Sci Tech J"},{"journal-title":"Artificial Intelligence-A Guide to Intelligent Systems-2nd Edition","year":"2005","author":"michael","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"7","article-title":"A new trusted and collaborative agent based approach for ensuring cloud security","volume":"10","author":"pal","year":"2012","journal-title":"Annals of Faculty Engineering Hunedoara International Journal of Engineering"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"4","first-page":"130","article-title":"Information-Theoretic measures for anomaly detection","author":"lee","year":"0","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"9","first-page":"22","article-title":"Building scalable distributed intrusion detection systems based on the mapreduce framework","author":"holtz","year":"2011","journal-title":"Revista Telecomunicaoes"},{"key":"8","article-title":"Intrusion detection techniques in grid and cloud computing environment","volume":"99","author":"vieira","year":"2009","journal-title":"IT Professional"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664354\/06664371.pdf?arnumber=6664371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:56:33Z","timestamp":1490208993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664371","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}