{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:15:11Z","timestamp":1774556111573,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406157","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:09:23Z","timestamp":1531177763000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS"],"prefix":"10.1109","author":[{"given":"Amir","family":"Teshome","sequence":"first","affiliation":[]},{"given":"Louis","family":"Rilling","sequence":"additional","affiliation":[]},{"given":"Christine","family":"Morin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"hancock","year":"1966","journal-title":"Signal Detection Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319710"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/09286586.2016.1255975"},{"key":"ref13","first-page":"213","article-title":"Ignorance of base rates","author":"phelps","year":"2015","journal-title":"Real-World Decision Making An Encyclopedia of Behavioral Economics An Encyclopedia of Behavioral Economics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128834"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.15"},{"key":"ref17","article-title":"SLA-Ready","year":"2016","journal-title":"Accessed"},{"key":"ref18","first-page":"216","article-title":"Web services agreement specification (ws-agreement)","volume":"128","author":"andrieux","year":"2007","journal-title":"Open Grid Forum"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2015.36"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSEEE.2014.6947859"},{"key":"ref27","article-title":"Wireshark","year":"2016","journal-title":"Accessed"},{"key":"ref3","year":"2016","journal-title":"Making Cloud SLAs readily usable in the EU private sector"},{"key":"ref6","article-title":"Automatically enforcing security slas in the cloud","author":"casola","year":"2016","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2010.5697973"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2010.36"},{"key":"ref7","article-title":"SPECS","year":"2017","journal-title":"Accessed"},{"key":"ref2","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA '99"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2016.034"},{"key":"ref1","article-title":"The Tao of Network Security Monitoring: Beyond Intrusion Detection","author":"bejtlich","year":"2004","journal-title":"Pearson Education"},{"key":"ref20","article-title":"Mcafee labs threats report 2015","year":"2015","journal-title":"McAfee Labs Tech Rep"},{"key":"ref22","article-title":"OpenStack","year":"2017","journal-title":"Accessed"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-04519-1_1","article-title":"Adding virtualization capabilities to the Grid'5000 testbed","volume":"367","author":"balouek","year":"2013","journal-title":"Cloud Computing and Services Science ser Communications in Computer and Information Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"ref23","article-title":"Open vSwitch","year":"2017","journal-title":"Accessed"},{"key":"ref26","first-page":"1996","article-title":"Tcp syn flooding and ip spoofing attacks","author":"center","year":"1996","journal-title":"CERT Advisory CA-1996-21"},{"key":"ref25","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","author":"ptacek","year":"1998","journal-title":"DTIC Document Tech Rep"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","location":"Taipei","start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406157.pdf?arnumber=8406157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:57:12Z","timestamp":1533023832000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406157","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}