{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:05:21Z","timestamp":1759133121894,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/istel.2016.7881927","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T16:34:21Z","timestamp":1490027661000},"page":"766-770","source":"Crossref","is-referenced-by-count":2,"title":["Security operation center implementation on OpenStack"],"prefix":"10.1109","author":[{"given":"Tala","family":"Tafazzoli","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Gharaee Garakani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.103"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CASON.2011.6085959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425455"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/3CA.2010.5533775"},{"key":"ref14","article-title":"SOCaaS: security operations center as a service for cloud computing environments","volume":"3","author":"alruwaili","year":"2014","journal-title":"International Journal of Cloud Computing and Services Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/computers3010001"},{"year":"0","key":"ref3"},{"key":"ref6","first-page":"583","volume":"28","author":"zissis","year":"2012","journal-title":"Addressing cloud computing security issues Future Generation Computer Systems"},{"journal-title":"Output of Security Operation Center Project at ITRC","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2013.6641054"},{"key":"ref7","first-page":"39","article-title":"Correlation and consolidation of distributed logging data in enterprise cloud","volume":"7","author":"reissmann","year":"2014","journal-title":"International Journal on Advances in Internet Technology"},{"year":"0","key":"ref2"},{"key":"ref1","article-title":"Openstack Security","author":"grant","year":"2014","journal-title":"Red Hat Product Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379551"}],"event":{"name":"2016 8th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2016,9,27]]},"location":"Tehran, Iran","end":{"date-parts":[[2016,9,28]]}},"container-title":["2016 8th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7878240\/7881760\/07881927.pdf?arnumber=7881927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T18:17:49Z","timestamp":1490984269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7881927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/istel.2016.7881927","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}