{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:42:01Z","timestamp":1769920921427,"version":"3.49.0"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2018,3,1]]},"DOI":"10.1109\/tbdata.2017.2715335","type":"journal-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T21:19:42Z","timestamp":1497561582000},"page":"11-25","source":"Crossref","is-referenced-by-count":51,"title":["Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4977-0511","authenticated-orcid":false,"given":"Thu Yein","family":"Win","sequence":"first","affiliation":[]},{"given":"Huaglory","family":"Tianfield","sequence":"additional","affiliation":[]},{"given":"Quentin","family":"Mair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"512","article-title":"Exploiting efficient data mining techniques to enhance intrusion detection systems","author":"lu","year":"2005","journal-title":"Proc IEEE Int Conf Inf Reuse Integr"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2014.6937009"},{"key":"ref12","first-page":"93","article-title":"Using large scale distributed computing to unveil advanced persistent threats","volume":"1","author":"giura","year":"2012","journal-title":"Sci J"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-8798-7_66"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"ref15","article-title":"Big data in critical infrastructures security\n monitoring: Challenges and opportunities","author":"aniello","year":"2014","journal-title":"arXiv 1405 0325"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSC.2015.7050784"},{"key":"ref17","first-page":"287","article-title":"BareCloud:\n Bare-metal analysis-based evasive malware detection","author":"kirat","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"key":"ref19","article-title":"Intrusion detection FAQ: What port numbers do well-known trojan horses use?","year":"2001"},{"key":"ref4","first-page":"91","article-title":"CloudAV:\n N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proc Usenix Secur Symp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.066"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19216-1_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14325-5_29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1356-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.03.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"ref1","article-title":"&#x2018;venom&#x2019; flaw in virtualization software could lead to\n VM escapes, data theft","author":"fisher","year":"2015"},{"key":"ref20","article-title":"Service name and transport protocol port number registry","year":"2015"},{"key":"ref22","author":"pearl","year":"2014","journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v033.i01"},{"key":"ref24","article-title":"Packetstorm security","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref25","first-page":"191","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8303643\/07949076.pdf?arnumber=7949076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:58Z","timestamp":1642004578000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7949076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,1]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2715335","relation":{},"ISSN":["2332-7790"],"issn-type":[{"value":"2332-7790","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,1]]}}}