{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:38:15Z","timestamp":1730227095555,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072640","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T13:34:44Z","timestamp":1679492084000},"page":"1812-1817","source":"Crossref","is-referenced-by-count":2,"title":["Preventing Critical Information framework against Cyber-Attacks using Cloud Computing and Big Data Analytics"],"prefix":"10.1109","author":[{"given":"Veera","family":"Talukdar","sequence":"first","affiliation":[{"name":"The Assam Kaziranga University,Assam"}]},{"given":"Shivaji","family":"Bothe","sequence":"additional","affiliation":[{"name":"Sri Balaji University Pune (SBUP),Department of IT &#x0026; Business Analytics"}]},{"given":"Rajesh","family":"Singh","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Uttaranchal Institute of Technology,Dehradun,Uttarakhand,India"}]},{"given":"R.","family":"Ponnusamy","sequence":"additional","affiliation":[{"name":"Chennai Institute of Technology,Department of Computer Science &#x0026; Engineering,Chennai,Tamilnadu,India"}]},{"given":"Unnati","family":"Joshi","sequence":"additional","affiliation":[{"name":"Parul University,Department of PIET,Gujarat,India"}]},{"given":"Suryansh","family":"Talukdar","sequence":"additional","affiliation":[{"name":"VIT Bhopal University,School of Computer Science and Engineering"}]}],"member":"263","reference":[{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0711-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.016"},{"key":"ref34","first-page":"904","article-title":"Data-driven semi-global alignment technique for masquerade detection in stand-alone and cloud computing systems","volume":"193","author":"ha","year":"2019"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.1016\/j.matpr.2019.12.010","article-title":"Modelling and Optimization of Different Quality Characteristics In Electric Discharge Drilling of Titanium Alloy Sheet","volume":"21","author":"jain","year":"2019","journal-title":"Material Today Proceedings"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.10"},{"key":"ref15","first-page":"74","article-title":"Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems","author":"gai","year":"2015","journal-title":"The 2nd IEEE International Conference on Cyber Security and Cloud Computing"},{"key":"ref36","article-title":"A novel pre-cache schema for high performance Android system","author":"zhao","year":"2015","journal-title":"Future Generation Computer Systems"},{"key":"ref14","first-page":"1","article-title":"Privacy protection for preventing data over-collection in smart city","author":"li","year":"2015","journal-title":"IEEE Transactions on Computers"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711277"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.68"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.128"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5120\/16578-6268"},{"key":"ref32","first-page":"1","article-title":"Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry","author":"gai","year":"2015","journal-title":"The 2nd IEEE International Conference on Cyber Security and Cloud Computing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2014.2344913"},{"journal-title":"Cyber security information sharing protections included in omnibus bill","year":"2015","author":"hofmann","key":"ref2"},{"journal-title":"Cybersecurity market reaches $75 billion in 2015 expected to reach $170 billion by 2020","year":"2015","author":"morgan","key":"ref1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.71"},{"key":"ref17","first-page":"1","article-title":"Proactive usercentric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry","author":"qiu","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref38","first-page":"1","article-title":"Defending jamming attack in wide-area monitoring system for smart grid","author":"niu","year":"2014","journal-title":"Telecommunication Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.250"},{"key":"ref19","first-page":"28","article-title":"A feasibility study of Platform-as-a-Service using cloud computing for a global service organization","volume":"7","author":"gai","year":"2014","journal-title":"Journal of Information Systems Applied Research"},{"key":"ref18","first-page":"7252","article-title":"Multiple Quality Optimizations In Electrical Discharge Drilling Of Mild Steel Sheet","volume":"8","author":"jain","year":"2019","journal-title":"Material Today Proceedings"},{"key":"ref24","article-title":"Fabrication and Machining of Fiber Matrix Composite through Electric Discharge Machining: A short review","author":"jain","year":"2021","journal-title":"Material Today Proceedings"},{"key":"ref46","first-page":"1493","article-title":"Enhancement of meta verse capabilities by IoTintegration","author":"veeraiah","year":"2022","journal-title":"Proc 2 nd Int Conf Advance Comput Innov Technol Eng (ICACITE)"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1016\/j.matpr.2021.03.642","article-title":"Experimental Investigations And Optimization Of Surface Roughness In Turning Of EN 36 Alloy Steel Using Response Surface Methodology And Genetic Algorithm","author":"panwar","year":"2021","journal-title":"Materials Today Proceedings"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.03.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.69"},{"key":"ref48","first-page":"290","article-title":"AI Techniques for Efficient Healthcare Systems in ECG Wave Based Cardiac Disease Detection by High Performance Modelling","volume":"14","author":"j","year":"2022","journal-title":"International Journal of Communication Networks and Information Security (IJCNIS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.137"},{"key":"ref47","article-title":"Explainable machine learning techniques in medical image analysis based on classification with feature extraction","author":"dwarakanath","year":"0","journal-title":"International Journal of Communication Networks and Information Security (IJCNIS)"},{"key":"ref42","article-title":"Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G","author":"qiu","year":"2015","journal-title":"International Journal of Communication Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.205"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/JOIC-04-2015-0025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1077-6"},{"key":"ref21","article-title":"Reducing cyber risk. Coast Guard Journal of Safety & Security at Sea","volume":"71","author":"dickman","year":"2014","journal-title":"Proceedings of the Marine Safety & Security Council"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.68"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1108\/JOIC-04-2015-0024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/07366981.2014.973234"},{"journal-title":"Cybersecurity insurance","year":"2015","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2409857"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.matpr.2021.03.642","article-title":"Experimental Investigations And Optimization Of Surface Roughness In Turning Of EN 36 Alloy Steel Using Response Surface Methodology And Genetic Algorithm","author":"panwar","year":"2021","journal-title":"Materials Today Proceedings"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.matpr.2019.06.292","article-title":"Modeling And Optimizing Of Different Quality Characteristics In Electrical Discharge Drilling Of Titanium Alloy (Grade-5) Sheet","volume":"18","author":"jain","year":"2019","journal-title":"Material Today Proceedings"},{"key":"ref4","first-page":"1","article-title":"Energy-aware data allocation with hybrid memory for mobile cloud systems","author":"qiu","year":"2014","journal-title":"IEEE Systems Journal"},{"key":"ref3","first-page":"60","volume":"1","author":"qiu","year":"2014","journal-title":"Enabling cloud computing in emergency management systems Cloud Computing"},{"key":"ref6","first-page":"98","article-title":"Ontology-based knowledge representation for secure self-diagnosis in patient-centered telehealth with cloud systems","author":"gai","year":"2015","journal-title":"The 2nd IEEE International Conference on Cyber Security and Cloud Computing"},{"key":"ref5","first-page":"1","article-title":"Intrusion detection techniques for mobile cloud computing in heterogeneous 5G","author":"gai","year":"2015","journal-title":"Security and Communication Networks"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2014.06.003"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072640.pdf?arnumber=10072640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:59:31Z","timestamp":1681138771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072640","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}