{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:37:30Z","timestamp":1766137050553,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/icin.2018.8401625","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T00:06:37Z","timestamp":1530576397000},"page":"1-8","source":"Crossref","is-referenced-by-count":16,"title":["A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments"],"prefix":"10.1109","author":[{"given":"Adel","family":"Abusitta","sequence":"first","affiliation":[]},{"given":"Martine","family":"Bellaiche","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Dagenais","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2009.5188784"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2014.37"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00036-3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0219198909002352"},{"key":"ref30","article-title":"Optimal load distribution for the detection of vm-based ddos attacks in the cloud","author":"wahab","year":"2017","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/544805.544809"},{"journal-title":"Distributed Computing Principles Algorithms and Systems","year":"2011","author":"kshemkalyani","key":"ref36"},{"journal-title":"An Introduction to Multiagent Systems","year":"2009","author":"wooldridge","key":"ref35"},{"journal-title":"Distributed Operating Systems Concepts and Design","year":"1998","author":"sinha","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199207954.001.0001"},{"key":"ref11","first-page":"330","article-title":"Dempster-shafer theory","author":"shafer","year":"1992","journal-title":"The Encyclopedia of Artificial Intelligence"},{"key":"ref12","first-page":"10","article-title":"Collaborative intrusion detection in federated cloud environments","volume":"3","author":"dermott","year":"2015","journal-title":"Journal of Computer Sciences and Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.46"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"107","DOI":"10.14257\/ijsia.2014.8.3.12","article-title":"A cooperative intrusion detection model for cloud computing networks","volume":"8","author":"teng","year":"2014","journal-title":"International Journal of Security and its Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495971"},{"key":"ref16","first-page":"665","article-title":"Community-based collaborative intrusion detection","author":"cordero","year":"2015","journal-title":"SECURECOMM"},{"key":"ref17","article-title":"Global intrusion detection in the domino overlay system","author":"yegneswaran","year":"2004","journal-title":"NDSS"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2005.63","article-title":"Collaborative internet worm containment","volume":"3","author":"cai","year":"2005","journal-title":"IEEE Security & Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/1912943"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-94-007-2911-7_8","article-title":"A collaborative intrusion detection system framework for cloud computing","author":"man","year":"2012","journal-title":"Proceedings of the International Conference on IT Convergence and Security 2011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/game.2001.0877"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3009925.3009932"},{"key":"ref29","article-title":"To-wards trustworthy multi-cloud services communities: A trust-based hedonic coalitional game","author":"wahab","year":"2016","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref5","first-page":"699","article-title":"Collaborative ids framework for cloud","volume":"18","author":"singh","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-319-19210-9_13","article-title":"cl-cidps: A cloud computing based cooperative intrusion detection and prevention system framework","author":"al-mousa","year":"2015","journal-title":"International Conference on Future Network Systems and Security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1016\/j.procs.2016.04.249","article-title":"A cooperative and hybrid network intrusion detection framework in cloud computing based on snort and optimized back propagation neural network","volume":"83","author":"chiba","year":"2016","journal-title":"Procedia Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.94"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.08.014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.07.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2015.7296133"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121214"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GAMENETS.2009.5137424"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.10.014"},{"key":"ref25","first-page":"2502","article-title":"The beta reputation system","volume":"5","author":"josang","year":"2002","journal-title":"Proceedings of the 15th Bled Electronic Commerce Conference"}],"event":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","start":{"date-parts":[[2018,2,19]]},"location":"Paris","end":{"date-parts":[[2018,2,22]]}},"container-title":["2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8392644\/8401570\/08401625.pdf?arnumber=8401625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:19:26Z","timestamp":1643206766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8401625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icin.2018.8401625","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}