{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:05:27Z","timestamp":1763535927829,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,23]]},"DOI":"10.1109\/ickii51822.2021.9574757","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T20:02:55Z","timestamp":1635364975000},"page":"105-110","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Security and Privacy Risks in Microservices End-to-End Communication Using Neural Networks"],"prefix":"10.1109","author":[{"given":"Joe","family":"Chou","sequence":"first","affiliation":[]},{"given":"Eyhab","family":"Al-Masri","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Kanzhelev","sequence":"additional","affiliation":[]},{"given":"Hossam","family":"Fattah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"195","article-title":"Microservices: yesterday, today, and tomorrow","author":"nicola","year":"2017","journal-title":"Present Ulterior Softw Eng"},{"journal-title":"Google Colaboratory","year":"0","key":"ref11"},{"key":"ref12","first-page":"250","article-title":"Privacy-Risk Detection in Microservices Composition Using Distributed Tracing","author":"deeksha","year":"2020","journal-title":"2020 IEEE Eurasia Conference on IOT Communication and Engineering (ECICE)"},{"key":"ref13","first-page":"76","article-title":"Flow-based anomaly detection using neural network optimized with GSA algorithm","author":"zahra","year":"2013","journal-title":"2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops"},{"journal-title":"Distributed Tracing in a Microservices World","year":"2018","author":"krohling","key":"ref14"},{"key":"ref15","first-page":"297","article-title":"Microservices in the modern software world","author":"kwan","year":"2016","journal-title":"Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering"},{"key":"ref16","first-page":"1991","article-title":"DeepAnT: A deep learning approach for unsupervised anomaly detection in time series","volume":"7","author":"mohsin","year":"2018","journal-title":"IEEE Access"},{"key":"ref17","first-page":"7109","article-title":"Automated Anomaly Detection and Localization System for a Microservices Based Cloud System","author":"naikade","year":"2020","journal-title":"Electronic Thesis and Dissertation Repository"},{"key":"ref18","first-page":"241","article-title":"Anomaly detection and classification using distributed tracing and deep learning","author":"sasho","year":"2019","journal-title":"2019 19th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID)"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"40168","DOI":"10.1109\/ACCESS.2018.2854842","article-title":"Spatio-temporal network traffic estimation and anomaly detection based on convolutional neural network in vehicular ad-hoc networks","volume":"6","author":"laisen","year":"2018","journal-title":"IEEE Access"},{"key":"ref28","first-page":"187","article-title":"Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPls in Web Applications","author":"haowen","year":"2018","journal-title":"Proceedings of the 2018 World Wide Web Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242795"},{"journal-title":"Microservices Flexible Software Architecture","year":"2016","author":"eberhard","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2018.00030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367605"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317873"},{"key":"ref8","first-page":"1","article-title":"Microservices approach for the internet of things","author":"bj\u00f6rn","year":"2016","journal-title":"2016 IEEE 21 st International Conference on Emerging Technologies and Factory Automation (ETFA)"},{"key":"ref7","first-page":"210","article-title":"Survey on Microservice Architecture-Security, Privacy and Standardization on Cloud Computing Environment","author":"almeida","year":"2017","journal-title":"ICSE 2017"},{"journal-title":"Al-Masri Eyhab","year":"2007","key":"ref2"},{"key":"ref9","article-title":"How to break a Monolith into Microservices","author":"zhamak","year":"2018","journal-title":"MartinFowler com"},{"journal-title":"Opentelemetry","year":"0","key":"ref1"},{"key":"ref20","first-page":"156","article-title":"A framework for monitoring microservice-oriented cloud applications in heterogeneous virtualization environments","author":"ayman","year":"2019","journal-title":"12th international conference on cloud computing"},{"journal-title":"Dapper a Large-scale Distributed Systems Tracing Infrastructure","year":"2010","author":"sigelman","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2019.00039"},{"journal-title":"Using Random Cut Forests for Real-Time Anomaly Detection in Amazon Elasticsearch Service","year":"0","author":"chris","key":"ref24"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCC.2016.111","article-title":"The design and architecture of microservices","volume":"3","author":"alan","year":"2016","journal-title":"IEEE Cloud Computing"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"110798","DOI":"10.1016\/j.jss.2020.110798","article-title":"A systematic mapping study on microservices architecture in devops","volume":"170","author":"muhammad","year":"2020","journal-title":"Journal of Systems and Software"},{"journal-title":"Keras","year":"0","key":"ref25"}],"event":{"name":"2021 IEEE 4th International Conference on Knowledge Innovation and Invention (ICKII)","start":{"date-parts":[[2021,7,23]]},"location":"Taichung, Taiwan","end":{"date-parts":[[2021,7,25]]}},"container-title":["2021 IEEE 4th International Conference on Knowledge Innovation and Invention (ICKII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9574698\/9574659\/09574757.pdf?arnumber=9574757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:34Z","timestamp":1652197654000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9574757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ickii51822.2021.9574757","relation":{},"subject":[],"published":{"date-parts":[[2021,7,23]]}}}