{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:38:27Z","timestamp":1755693507338,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,21]]},"DOI":"10.1109\/cloudtech58737.2023.10366149","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:27:46Z","timestamp":1703878066000},"page":"01-08","source":"Crossref","is-referenced-by-count":1,"title":["Data Security Patterns for Critical Big Data Systems"],"prefix":"10.1109","author":[{"given":"Chaymae","family":"Majdoubi","sequence":"first","affiliation":[{"name":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco"}]},{"given":"Saida","family":"El mendili","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco"}]},{"given":"Youssef","family":"Gahi","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74500-8_54"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2022.2050018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn55064.2022.9892437"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app13031374"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3189674"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/app13063980"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2022.02.290"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061467"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app10238423"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app13063792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.07.108"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICITBS.2019.00053"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29407-6_50"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23502-4_12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICVRIS.2019.00036"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2017.2702172"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2019.8836992"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57024-8_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00727-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/su122410571"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841037"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.15282\/ijsecs.6.1.2020.5.0068"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.01.051"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/s10462-023-10466-8","article-title":"Deep learning modelling techniques: current progress, applications, advantages, and challenges","volume-title":"Artifcial Intelligence Review","author":"Ahmed","year":"2023"},{"key":"ref28","article-title":"A lightweight DDoS detection scheme under SDN context","volume-title":"Cybersecurity","author":"Jia","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-022-00128-7"},{"issue":"103","key":"ref30","article-title":"Automated detection of COVID-19 cases using deep neural networks with X-ray images","volume":"121","author":"EA","year":"2020","journal-title":"Comput Biol Med"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2994762"},{"journal-title":"COVIDX-Net: A Framework of Deep Learning Classifiers to Diagnose COVID-19 in X-Ray Images","year":"2020","author":"Hemdan","key":"ref32"},{"key":"ref33","first-page":"10250","article-title":"A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19","volume-title":"The Journal of Supercomputing","volume":"78","author":"Hassan","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04387-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8100256"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s22020551"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3697536"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09345-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09717-4"}],"event":{"name":"2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","start":{"date-parts":[[2023,11,21]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2023,11,23]]}},"container-title":["2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10365713\/10366053\/10366149.pdf?arnumber=10366149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T21:54:12Z","timestamp":1705096452000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10366149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/cloudtech58737.2023.10366149","relation":{},"subject":[],"published":{"date-parts":[[2023,11,21]]}}}