{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:40:56Z","timestamp":1769312456295,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331387","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Systematic Evaluation of Preprocessing Strategies for IDS in Imbalanced Cloud Traffic"],"prefix":"10.1109","author":[{"given":"Xiaoya","family":"Liu","sequence":"first","affiliation":[{"name":"Shenzhen MSU-BIT University,Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing,Guangdong,China"}]},{"given":"Zihan","family":"Meng","sequence":"additional","affiliation":[{"name":"Shenzhen MSU-BIT University,Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing,Guangdong,China"}]},{"given":"Xiaowen","family":"Ling","sequence":"additional","affiliation":[{"name":"Shenzhen MSU-BIT University,Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing,Guangdong,China"}]},{"given":"Feng","family":"Liang","sequence":"additional","affiliation":[{"name":"Shenzhen MSU-BIT University,Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing,Guangdong,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102580","DOI":"10.1016\/j.cose.2021.102580","article-title":"Cloud computing security: A survey of service-based models","volume":"114","author":"Khoda Parast","year":"2022","journal-title":"Computers & Security"},{"issue":"1","key":"ref2","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11277-022-09960-z","article-title":"Cloud security threats and solutions: A survey","volume":"128","author":"Butt","year":"2023","journal-title":"Wireless Personal Communications"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"102940","DOI":"10.1016\/j.cose.2022.102940","article-title":"Extreme minority class detection in imbalanced data for network intrusion","volume":"123","author":"Milosevic","year":"2022","journal-title":"Computers & Security"},{"issue":"5","key":"ref4","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","article-title":"A systematic literature review for network intrusion detection system (ids)","volume":"22","author":"Abdulganiyu","year":"2023","journal-title":"International Journal of Information Security"},{"issue":"6","key":"ref5","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","article-title":"Internet of things intrusion detection systems: a comprehensive review and future directions","volume":"26","author":"Heidari","year":"2023","journal-title":"Cluster Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.205"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON62057.2024.10838096"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-981-16-0965-7_53","article-title":"Low rate multi-vector ddos attack detection using information gain based feature chapter","volume-title":"Computer Networks, Big Data and IoT","author":"Rejimol Robinson","year":"2021"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-981-16-4118-3_4","article-title":"The effect of sampling methods on the cicids2017 network intrusion data chapter","volume-title":"IT Convergence and Security","author":"Ho","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NILES63360.2024.10753149"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC47137.2019.9068081"},{"key":"ref16","first-page":"49","article-title":"Detail analysis on machine learning based malicious network traffic classification","volume-title":"Proc. Int. Conf. Smart Media Appl","author":"Yeom","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3050917"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"102748","DOI":"10.1016\/j.cose.2022.102748","article-title":"A new ddos attacks intrusion detection model based on deep learning for cybersecurity","volume":"118","author":"Akgun","year":"2022","journal-title":"Computers & Security"},{"issue":"3","key":"ref20","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1007\/s11219-022-09587-0","article-title":"Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study","volume":"30","author":"Catillo","year":"2022","journal-title":"Software Quality Journal"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/978-981-16-0739-4_58","article-title":"Performance assessment of ids based on cicids-2017 chapter","volume-title":"Information and Communication Tech-nology for Competitive Strategies (ICTCS 2020)","author":"Priyanka","year":"2022"},{"key":"ref22","first-page":"929","article-title":"Com-parative study of machine learning techniques for intrusion detection on cicids-2017 dataset","volume-title":"2023 10th International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Arshad","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI54924.2022.9820579"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ADACIS59737.2023.10424105"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"102777","DOI":"10.1016\/j.cose.2022.102777","article-title":"Mmm-rf: A novel high accuracy multinomial mixture model for network intrusion detection systems","volume":"120","author":"Hammad","year":"2022","journal-title":"Computers & Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.30591\/jpit.v8i2.5207"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT62922.2024.10923912"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2024.49.11.1510"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.24.22797"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331387.pdf?arnumber=11331387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:08:15Z","timestamp":1768979295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331387","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}