{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:44:00Z","timestamp":1772556240168,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,12]]},"DOI":"10.1109\/sds57574.2022.10062930","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T17:19:12Z","timestamp":1679073552000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A New Approach Based on a Multi\u2013Agent System for IDS in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Dounya","family":"Kassimi","sequence":"first","affiliation":[{"name":"University Center Aflou,Department of Computer Science,Laghouat,Algeria"}]},{"given":"Okba","family":"Kazar","sequence":"additional","affiliation":[{"name":"UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates"}]},{"given":"Ezedin","family":"Barka","sequence":"additional","affiliation":[{"name":"UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates"}]},{"given":"Abdelhak","family":"Merizig","sequence":"additional","affiliation":[{"name":"University of Biskra,Department of Computer Science,Biskra,Algeria"}]},{"given":"Zina","family":"Houhamdi","sequence":"additional","affiliation":[{"name":"Al Ain University,Cybersecurity Department,Al Ain,United Arab Emirates"}]},{"given":"Belkacem","family":"Athamena","sequence":"additional","affiliation":[{"name":"Al Ain University,Business Administration Department,Al Ain,United Arab Emirates"}]},{"given":"Meftah","family":"Zaoui","sequence":"additional","affiliation":[{"name":"University of Biskra,Department of Computer Science,Biskra,Algeria"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Computer security handbook","author":"Bosworth","year":"2002"},{"key":"ref2","article-title":"The emergence of big-data-as-a-service: Its bdaas","volume-title":"BDaaS","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588654"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MATHIT.2017.8259716"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/fi7020094"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_7"},{"issue":"11","key":"ref7","first-page":"4349","article-title":"A survey on machine learning techniques for intrusion detection systems","volume":"2","author":"Singh","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"key":"ref9","first-page":"22","article-title":"Big data analytics for sophisticated attack detection","volume":"3","author":"Virvilis","year":"2014","journal-title":"Isaca Journal"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.23"},{"key":"ref11","volume-title":"CCNP Implementing Secured Converged Wide-Area Networks (ISCW 642\u2013825) Lab Portfolio","author":"Kotfila","year":"2008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15242\/iie.e0414077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"ref14","volume-title":"Data mining: concepts and techniques","author":"Han","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30428-6_8"},{"key":"ref16","first-page":"1","article-title":"Data clustering for anomaly detection in network intrusion detection","author":"Nieves","year":"2009","journal-title":"Research Alliance in Math and Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.07"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.vol21no2.3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.12691\/jcn-4-1-5"},{"key":"ref22","volume-title":"Analytics on big fast data using real time stream data processing architecture","author":"Bhattacharya","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.110"},{"key":"ref24","first-page":"1","article-title":"A new world of opportunities","author":"Data","year":"2012","journal-title":"NESSI White Paper"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1089\/big.2018.0023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.81"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597201"},{"key":"ref28","first-page":"1","article-title":"Framework to detect and repair distributed intrusions based on mobile agent in hybrid cloud","volume-title":"Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA). The Steering Committee of The World Congress in Computer Science, Computer\u2026","author":"Khaldi","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2136-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0644-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_10"},{"key":"ref32","first-page":"54","article-title":"Intelligent intrusion detection system for private cloud environment","volume-title":"International Symposium on Security in Computing and Communication","author":"Rajendran","year":"2015"},{"issue":"2015","key":"ref33","first-page":"39","article-title":"Improving virtual machine security through intelligent intrusion detection system","volume":"6","author":"Ambikavathi","year":"2015","journal-title":"Indian Journal of Computer Science and Engineering (IJCSE)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2018010104"},{"key":"ref35","article-title":"Manuel dIntelligence Artificielle","author":"Fr\u00e9con","year":"2009","journal-title":"PPUR: presse polytechnique universitaire romande"},{"key":"ref36","first-page":"41","article-title":"Applications et enjeux des big data dans le contexte des d\u00e9fis mondiaux","author":"Saouli","year":"2016","journal-title":"Conf\u00e9rence sur Les Avanc\u00e9es des Syst\u00e8mes D\u00e9cisionnels (ASD)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14257\/ijseia.2017.11.9.01"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3090354.3090355"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.031512.110146"},{"key":"ref40","volume-title":"Datasets for data science, machine learning, ai amp; analytics"},{"key":"ref41","volume-title":"A petabyte-scale scientific community cloud"},{"key":"ref42","article-title":"Open data sponsorship program","volume-title":"A. W. S. (AWS)"}],"event":{"name":"2022 Ninth International Conference on Software Defined Systems (SDS)","location":"Paris, France","start":{"date-parts":[[2022,12,12]]},"end":{"date-parts":[[2022,12,15]]}},"container-title":["2022 Ninth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10062416\/10062868\/10062930.pdf?arnumber=10062930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T10:17:56Z","timestamp":1707819476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10062930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/sds57574.2022.10062930","relation":{},"subject":[],"published":{"date-parts":[[2022,12,12]]}}}