{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:05:16Z","timestamp":1767261916002,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,25]]},"DOI":"10.1109\/icspis51252.2020.9340136","type":"proceedings-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T13:05:49Z","timestamp":1612962349000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Trusted Security Model for IDS Using Deep Learning"],"prefix":"10.1109","author":[{"given":"Khalid Al","family":"Makdi","sequence":"first","affiliation":[{"name":"University of Idaho,Computer science department,Moscow,ID,USA,83844"}]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[{"name":"University of Idaho,Computer science department,Moscow,ID,USA,83844"}]},{"given":"Abdullah Abu","family":"Hussein","sequence":"additional","affiliation":[{"name":"ST. Cloud State University,Department of Information Systems,St.Cloud,MN,USA,56301"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.004"},{"key":"ref30","first-page":"8","article-title":"Comparative study of deep learning models for network intrusion detection","volume":"1","author":"lee","year":"2018","journal-title":"SMU Data Science Review"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2012.046711"},{"key":"ref11","first-page":"729","article-title":"Intrusion detection in the cloud","author":"roschke","year":"0","journal-title":"2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703265"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058397"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","article-title":"Random forest modeling for network intrusion detection system","volume":"89","author":"farnaaz","year":"2016","journal-title":"Procedia Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.11.018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.06.006"},{"key":"ref17","first-page":"744","article-title":"Survey on malware evasion techniques: State of the art and challenges","author":"marpaung","year":"0","journal-title":"2012 14th International Conference on Advanced Communication Technology (ICACT)"},{"key":"ref18","first-page":"1","article-title":"Paint it black: Evaluating the effectiveness of malware blacklists","author":"k\u00fchrer","year":"0","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref19","first-page":"46","article-title":"Pillar-box: Combating next-generation malware with fast forward- secure logging","author":"bowers","year":"0","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref4","article-title":"A Review of Intrusion Detection System in Cloud Computing","author":"rani","year":"0","journal-title":"Proceedings of International Conference on Sustainable Computing in Science Technology and Management (SUSCOM) Amity University Rajasthan Jaipur-India 2019 Feb 26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"ref3","first-page":"67","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"shelke","year":"2012","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.procs.2018.01.095","article-title":"Distributed intrusion detection system for cloud environments based on data mining techniques","volume":"127","author":"muhammad","year":"2018","journal-title":"Procedia Computer Science"},{"key":"ref8","article-title":"Intrusion detection system","author":"pei","year":"2007","journal-title":"Carlos Simon"},{"journal-title":"Intrusion Detection Systems","year":"2008","author":"di pietro","key":"ref7"},{"key":"ref2","first-page":"8:100118","article-title":"Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges","author":"gill","year":"2019","journal-title":"Internet of Things"},{"key":"ref9","first-page":"50","article-title":"Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study","volume":"10","author":"ei-taj","year":"2012","journal-title":"International Journal of Information and Computer Security"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","article-title":"Firefly algorithm based feature selection for network intrusion detection","volume":"81","author":"selvakumar","year":"2019","journal-title":"Computers &Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408679"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2015.7124898"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7337012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625278"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"}],"event":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","start":{"date-parts":[[2020,11,25]]},"location":"DUBAI, United Arab Emirates","end":{"date-parts":[[2020,11,26]]}},"container-title":["2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9340125\/9340126\/09340136.pdf?arnumber=9340136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:25:05Z","timestamp":1656375905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icspis51252.2020.9340136","relation":{},"subject":[],"published":{"date-parts":[[2020,11,25]]}}}