{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:18:25Z","timestamp":1725524305108},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iisa.2017.8316457","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T16:46:49Z","timestamp":1521132409000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Fraud threats disclosure through cloud information security framework"],"prefix":"10.1109","author":[{"given":"Theodoros","family":"Mavroeidakos","sequence":"first","affiliation":[]},{"given":"Dimitrios D.","family":"Vergados","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1109\/ICCSE.2013.6554022","article-title":"(2013). Performance Evaluation of a Fraud Detection System based Artificial Immune System on the Cloud","author":"hormozi","year":"2013","journal-title":"8th International Conference on Computer Science & Education (ICCSE 2013) 26-28"},{"key":"ref11","first-page":"4049","article-title":"(2014). A novel model for credit card fraud detection using Artificial Immune Systems","author":"halvaiee","year":"2014","journal-title":"Applied Soft Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.307"},{"journal-title":"Federal Bureau of Investigation Internet Crime COmplaint Center (IC3)","article-title":"Internet Crime Schemes","year":"0","key":"ref13"},{"key":"ref14","first-page":"28","article-title":"A review paper on botnet and botnet detection techniques in cloud computing","author":"anwar","year":"2014","journal-title":"Proc ISCIS"},{"journal-title":"General Data Protection Regulation officially Regulation 2016\/679 on the protection of natural persons in regards to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"0","key":"ref15"},{"journal-title":"NIS Directive officially Directive (EU) 2016\/1148 concerning measures for a high common level of se- curity of network and information systems across the Union","year":"0","key":"ref16"},{"journal-title":"Directive 2002\/58\/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006\/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws","article-title":"Directive 2009\/136\/EC: amending Directive 2002\/22\/EC on universal service and users rights relating to electronic communications networks and services","year":"0","key":"ref17"},{"journal-title":"Directive 97\/7\/EC on the protection of consumers in respect of distance contracts","year":"0","key":"ref18"},{"journal-title":"Directives 97\/7\/EC 98\/27\/EC and 2002\/65\/EC of the European Parliament and of the Council and Regulation (EC) No 2006\/2004 of the European Parliament and of the Council","article-title":"Unfair Commercial Practices Directive: officially Directive 2005\/29\/EC concerning unfair business-to-consumer commercial practices in the internal market and amending Council Directive 84\/450\/EEC","year":"0","key":"ref19"},{"key":"ref4","first-page":"3","article-title":"European Network and Information Security Agency (ENISA), (2012)","year":"2012","journal-title":"Critical Cloud Computing Version 1 0"},{"key":"ref3","first-page":"21","article-title":"European Network and Information Security Agency (ENISA), (2009)","year":"2009","journal-title":"Cloud Computing Benefits Risks and Recommendations for Information Security"},{"key":"ref6","first-page":"800","article-title":"(2011). Guidelines on Security and Privacy in Public Cloud Computing","author":"wayne","year":"2011","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"ref5","first-page":"5","article-title":"European Network and Information Security Agency (ENISA), (2015)","year":"2015","journal-title":"Security Framework for Governmental Clouds"},{"journal-title":"NIST Cloud Computing Security Reference Architecture National Institute of Standards and Technology (NIST) Special Publication 500&#x2013;299","year":"2013","key":"ref8"},{"journal-title":"NIST Cloud Computing Standards Roadmap National Institute of Standards and Technology (NIST) Special Publication 500&#x2013;291 Version 2","year":"2013","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562097"},{"journal-title":"Top Threats to Cloud Computing Version 1 0","article-title":"Cloud Security Alliance (CSA), (2010)","year":"2010","key":"ref1"},{"journal-title":"Security and Privacy Controls for Federal Information Systems and Organizations National Institute of Standards and Technology (NIST) Special Publication 800&#x2013;53 Revision 4","year":"2013","key":"ref9"},{"journal-title":"Directive 93\/13\/EEC on unfair terms in consumer contracts","year":"0","key":"ref20"},{"journal-title":"Commission Delegated Regulation 2016\/1675 supplementing Directive (EU) 2015\/849 of the European Parliament and of the Council by identifying high-risk third countries with strategic deficiencies","year":"0","key":"ref22"},{"journal-title":"particular electronic commerce in the Internal Market","article-title":"Directive on electronic commerce: officially Directive 2000\/31\/EC on certain legal aspects of information society services","year":"0","key":"ref21"}],"event":{"name":"2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2017,8,27]]},"location":"Larnaca","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 8th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8308011\/8316350\/08316457.pdf?arnumber=8316457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T19:57:48Z","timestamp":1570910268000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8316457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iisa.2017.8316457","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}