{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:13:16Z","timestamp":1729674796935,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ssci.2016.7850080","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:24:33Z","timestamp":1487283873000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Identification of program signatures from cloud computing system telemetry data"],"prefix":"10.1109","author":[{"given":"Nicole","family":"Nichols","sequence":"first","affiliation":[]},{"given":"Mark","family":"Greaves","sequence":"additional","affiliation":[]},{"given":"William","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"LaMothe","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Longoni","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Teuton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.cose.2011.05.007","article-title":"Feature representation and selection in malicious code detection methods based on static system calls","volume":"30","author":"ding","year":"2011","journal-title":"Computers & Security"},{"article-title":"Malware detection and kernel rootkit prevention in cloud computing environments","year":"0","author":"matthias","key":"ref11"},{"key":"ref12","article-title":"Privacy-preserving public auditing for data storage security in cloud computing","author":"cong","year":"2010","journal-title":"INFOCOM 2010 Proceedings IEEE"},{"article-title":"A framework for behavior-based malware analysis in the cloud","year":"0","author":"lorenzo","key":"ref13"},{"article-title":"CloudAV: N-Version Antivirus in the Network Cloud","year":"0","author":"jon","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/2924715.2924719","article-title":"ScanMe mobile: a cloud-based Android malware analysis service","volume":"16","author":"hanlin","year":"2016","journal-title":"ACM SIGAPP Applied Computing Review"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","article-title":"A survey of intrusion detection techniques in cloud","volume":"36","author":"chirag","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","article-title":"An intrusion detection and prevention system in cloud computing: A systematic review","volume":"36","author":"ahmed","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"article-title":"Classification and regression trees","year":"1984","author":"leo","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.istr.2009.03.001","article-title":"Cloud security technologies","volume":"14","author":"igor","year":"2009","journal-title":"Information Security Technical Report"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","article-title":"Managing security of virtual machine images in a cloud environment","author":"jinpeng","year":"2009","journal-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security"},{"key":"ref5","article-title":"Cloud Computing - benefits, risks, and recommendations for information security","author":"balboni","year":"2009","journal-title":"European Network and Information Security Agency Tech Rep"},{"key":"ref8","first-page":"17","article-title":"Cloud computing roundtable","volume":"6","author":"eric","year":"2010","journal-title":"IEEE Security & Privacy"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"year":"2010","key":"ref2","article-title":"Top threats to cloud computing v1. 0"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","article-title":"Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey","volume":"14","author":"asaf","year":"2009","journal-title":"Information Security Technical Report"},{"key":"ref1","first-page":"15","article-title":"Is cloud computing really ready for prime time","volume":"27","author":"neal","year":"2009","journal-title":"Growth"},{"article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","year":"0","author":"garfinkel","key":"ref20"},{"key":"ref22","article-title":"Detecting fraudulent activity in a cloud using privacy-friendly data aggregates","volume":"6721","author":"marc","year":"2014","journal-title":"arXiv preprint arXiv 1411"},{"article-title":"Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)","year":"0","author":"venkatanathan","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0103582"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2016,12,6]]},"location":"Athens, Greece","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840087\/7849361\/07850080.pdf?arnumber=7850080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:56:52Z","timestamp":1568836612000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7850080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ssci.2016.7850080","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}