{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:04:51Z","timestamp":1772643891552,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/commnet.2019.8742390","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T03:23:21Z","timestamp":1561087401000},"page":"1-9","source":"Crossref","is-referenced-by-count":10,"title":["A Clever Approach to Develop an Efficient Deep Neural Network Based IDS for Cloud Environments Using a Self-Adaptive Genetic Algorithm"],"prefix":"10.1109","author":[{"given":"Zouhair","family":"Chiba","sequence":"first","affiliation":[]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Moussaid","sequence":"additional","affiliation":[]},{"given":"Amina El","family":"Omri","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Rida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"258","article-title":"Network intrusion detection using naive bayes","volume":"7","author":"panda","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2015.32002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.129"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.29196\/jub.v26i1.351"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.095"},{"key":"ref10","first-page":"5023","article-title":"Virtual host based intrusion detection system for cloud","volume":"5","author":"moorthy","year":"2013","journal-title":"Journal of Engineering & Technology"},{"key":"ref11","first-page":"179","article-title":"Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms","volume":"1","author":"saljoughi","year":"2017","journal-title":"Emerging Science Journal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3187-8_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.01.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7521-6_21"},{"key":"ref15","first-page":"223","article-title":"Speech emotion recognition using deep neural network and extreme learning machine","author":"han","year":"2014","journal-title":"Fifteenth Annual Conference of the International Speech Communication Association"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref19","first-page":"150","article-title":"Genetic algorithm approach to intrusion detection system","volume":"3","author":"uppalaiah","year":"2012","journal-title":"IJCST"},{"key":"ref28","first-page":"1","article-title":"Ensemble learning approach for the enhancement of performance of intrusion detection system","author":"abdulrahaman","year":"2018","journal-title":"International Conference on Information and Communication Technology and its Applications (ICTA 2018)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"ref27","article-title":"Intrusion detection and attack classification using back-propagation neural network","volume":"3","author":"gaidhane","year":"2014","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref3","first-page":"297","article-title":"Threats and vulnerabilities of vloud computing: a review","volume":"6","author":"suryateja","year":"2018","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref6","author":"hodo","year":"2017","journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey"},{"key":"ref29","author":"song","year":"2006","journal-title":"Description of Kyoto University Benchmark Data"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/QiR.2015.7374895"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-0328-6_6"},{"key":"ref7","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref2","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.110"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.072"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.023"},{"key":"ref22","first-page":"1","article-title":"Ensemble learning approach for the Enhancement of performance of intrusion detection system","author":"musbau","year":"2018","journal-title":"International Conference on Information and Communication Technology and its Applications (ICTA 2018)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597201"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.49"},{"key":"ref23","first-page":"699","article-title":"Collaborative ids framework for cloud","volume":"18","author":"singh","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751979"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2014.7019145"}],"event":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","location":"Rabat, Morocco","start":{"date-parts":[[2019,4,12]]},"end":{"date-parts":[[2019,4,14]]}},"container-title":["2019 International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8734471\/8742344\/08742390.pdf?arnumber=8742390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:51Z","timestamp":1658261991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8742390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/commnet.2019.8742390","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}