{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:19:18Z","timestamp":1765887558647},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682765","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:48:17Z","timestamp":1387327697000},"source":"Crossref","is-referenced-by-count":41,"title":["A cloud computing based architecture for cyber security situation awareness"],"prefix":"10.1109","author":[{"given":"Wei","family":"Yu","sequence":"first","affiliation":[]},{"family":"Guobin Xu","sequence":"additional","affiliation":[]},{"family":"Zhijiang Chen","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Moulema","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488430"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2010.214"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"12","year":"2010","journal-title":"Overview Nist Cloud Computing Efforts Nist Senior Executive for Cloud Computing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2065891"},{"key":"2","first-page":"267","article-title":"Aneka: A software platform for. net-based cloud computing","author":"vecchiola","year":"2009","journal-title":"High Speed and Large Scale Scientific Computing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1117\/12.606980"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","location":"National Harbor, MD, USA","start":{"date-parts":[[2013,10,14]]},"end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682765.pdf?arnumber=6682765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:34:39Z","timestamp":1602686079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6682765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682765","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}