{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T18:41:11Z","timestamp":1762972871926,"version":"3.45.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073468","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T13:34:44Z","timestamp":1679492084000},"page":"22-26","source":"Crossref","is-referenced-by-count":12,"title":["A Machine Learning Approach to Analyze Cloud Computing Attacks"],"prefix":"10.1109","author":[{"given":"Sangeeta","family":"Rani","sequence":"first","affiliation":[{"name":"Amity University,Amity School of Engineering &#x0026; Technology,Manesar,Gurgaon,India"}]},{"given":"Khushboo","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Amity University,Amity School of Engineering &#x0026; Technology,Manesar,Gurgaon,India"}]},{"given":"Yojna","family":"Arora","sequence":"additional","affiliation":[{"name":"Amity University,Amity School of Engineering &#x0026; Technology,Manesar,Gurgaon,India"}]},{"given":"Ajay","family":"Kumar","sequence":"additional","affiliation":[{"name":"JECRC University,School of Engineering &#x0026; Technology,Jaipur,Rajasthan,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087316"},{"issue":"1","key":"ref2","first-page":"52","article-title":"A survey of cloud computing security challenges and solutions","volume":"14","author":"Hussein","year":"2016","journal-title":"International Journal of Computer Science and Information Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2018.8486161"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.589424"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-013-0452-6"},{"key":"ref7","article-title":"Idps: An integrated intrusion handling model for cloud","author":"Alsafi","year":"2012","journal-title":"arXiv preprint arXiv:1203.3323"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/351047"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2015.60"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/507338.507355"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2017.8284731"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AICAI.2019.8701238"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376973"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00215"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.19101\/ijatee.2018.547030"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030413"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012411"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v16.i1.pp435-440"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/993\/1\/012099"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03359-0_3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIPTM54933.2022.9754044"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.039"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.35444\/IJANA.2019.11017"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073468.pdf?arnumber=10073468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T18:37:42Z","timestamp":1762972662000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073468","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}