{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:06Z","timestamp":1730248626402,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750181","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"150-155","source":"Crossref","is-referenced-by-count":4,"title":["Considering an elastic scaling model for cloud Security"],"prefix":"10.1109","author":[{"given":"Aine","family":"MacDermott","sequence":"first","affiliation":[]},{"family":"Qi Shi","sequence":"additional","affiliation":[]},{"given":"Madjid","family":"Merabti","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Kifiyat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/WAINA.2010.85"},{"key":"22","first-page":"1","article-title":"Top threats to cloud computing v1 o","year":"2010","journal-title":"Cloud Security Alliance"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.5120\/5508-7533"},{"year":"2013","journal-title":"Cloud Security Alliance","article-title":"The notorious nine cloud computing top threats in 2013","key":"23"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/1980022.1980076"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"15","first-page":"502","article-title":"Network activity classification schema in iDS and log audit for cloud computing","author":"prof","year":"2013","journal-title":"2013 International Conference on Information Communication and Embedded Systems (ICICES)"},{"key":"16","first-page":"309","article-title":"OpenLIDS a lightweight intrusion detection system for wireless mesh networks categories and subject descriptors","author":"hugelshofer","year":"2009","journal-title":"Proceedings of the 15th International Conference on Mobile Computing and Networking"},{"key":"13","first-page":"71","volume":"34","author":"gul","year":"2011","journal-title":"Distributed Cloud Intrusion Detection Model"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/CRIS.2010.5617547"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ICCCI.2012.6158820"},{"key":"12","first-page":"125","article-title":"Research on the intrusion detection mechanism based on cloud computing","author":"xin","year":"2010","journal-title":"Intelligent Computing and Intelligent Systems (ICIS)"},{"year":"0","author":"bhadauria","journal-title":"A Survey on Security Issues in Cloud Computing","key":"21"},{"key":"3","first-page":"552","article-title":"Multi-level intrusion detection system and log management in cloud computing","author":"lee","year":"2011","journal-title":"2011 13th International Conference on Advanced Communication Technology (ICACT)"},{"key":"20","first-page":"1","article-title":"Intrusion detection in cloud computing environment using neural network","volume":"1","author":"mahmood","year":"2012","journal-title":"International Journal of Research in Computer Engineering and Electronics"},{"year":"2012","author":"dekker","journal-title":"Critical Cloud Computing-A CIIP Perspective on Cloud Computing Services","key":"2"},{"year":"2011","journal-title":"The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/CCIS.2011.6045076"},{"year":"0","author":"annapureddy","journal-title":"Security Challenges in Hybrid Cloud Infrastructures","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/MIC.2010.86"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.future.2012.01.006"},{"year":"2012","journal-title":"Greece","article-title":"Discussion on the challenges for the development of a context for secure cloud computing for critical infrastructure IT","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.4108\/icst.collaboratecom.2011.247158"},{"year":"2011","journal-title":"The Cloud Changing the Business Ecosystem","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750181.pdf?arnumber=6750181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:37:29Z","timestamp":1490294249000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750181","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}