{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:20Z","timestamp":1750306460076,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,25]],"date-time":"2015-09-25T00:00:00Z","timestamp":1443139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,25]]},"DOI":"10.1145\/2797143.2797145","type":"proceedings-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:02:27Z","timestamp":1442329347000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly Detection In Secure Cloud Environments Using a Self-Organizing Feature Map (SOFM) Model For Clustering Sets of R-Ordered Vector-Structured Features"],"prefix":"10.1145","author":[{"given":"Ioannis M.","family":"Stephanakis","sequence":"first","affiliation":[{"name":"OTE (Hellenic Telecom Organization), 99 Kifissias Avenue, GR-151 24, Athens, Greece, +30 210 6115798"}]},{"given":"Ioannis P.","family":"Chochliouros","sequence":"additional","affiliation":[{"name":"Research Programs Section, OTE, Pelika &amp; Spartis Str., GR-151 22 Maroussi, Greece, +30 210-6114651"}]},{"given":"Evangelos","family":"Sfakianakis","sequence":"additional","affiliation":[{"name":"Research Programs Section, OTE Pelika &amp; Spartis Str. GR-151 22 Maroussi, Greece, +30 210-6114938"}]},{"given":"Noorulhassan","family":"Shirazi","sequence":"additional","affiliation":[{"name":"School of Comp. &amp; Communications, Lancaster University, UK, +44 1524 510380"}]}],"member":"320","published-online":{"date-parts":[[2015,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Network Anomaly Detection in the Cloud: The Challenges of Virtual Service Migration. In IEEE International Conference on Communications","author":"Adamova K.","year":"2004","unstructured":"Adamova , K. , Schatzmann , D. , Plattner , B. and Smith . P. 2004 . Network Anomaly Detection in the Cloud: The Challenges of Virtual Service Migration. In IEEE International Conference on Communications ( Sydney, NSW , 10-14 June 2014). ICC, 3770--3775. DOI=10.1109\/ICC.2014.6883908 Adamova, K., Schatzmann, D., Plattner, B. and Smith. P. 2004. Network Anomaly Detection in the Cloud: The Challenges of Virtual Service Migration. In IEEE International Conference on Communications (Sydney, NSW, 10-14 June 2014). ICC, 3770--3775. DOI=10.1109\/ICC.2014.6883908"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"329","article-title":"2014. Overview - Snort Intrusion Detection System","volume":"4","author":"Tomar K.","year":"2014","unstructured":"Tomar K. , Tyagi S.S and Agrawal R . 2014. Overview - Snort Intrusion Detection System in Cloud Environment. International Journal of Information and Computation Technology 4 ( 3 ) ( 2014 ), 329 -- 334 . ISSN 0974-2239. Tomar K., Tyagi S.S and Agrawal R. 2014. Overview - Snort Intrusion Detection System in Cloud Environment. International Journal of Information and Computation Technology 4(3) (2014), 329--334. ISSN 0974-2239.","journal-title":"Cloud Environment. International Journal of Information and Computation Technology"},{"key":"e_1_3_2_1_3_1","volume-title":"4.1 Anomaly Detection Techniques for Cloud Computing. The SEcure Cloud computing for CRitical infrastructure IT","author":"Simpson S.","year":"2013","unstructured":"Simpson , S. , Shirazi , N , Hutchison , D. , Backhaus , H. 2013. Deliverable : 4.1 Anomaly Detection Techniques for Cloud Computing. The SEcure Cloud computing for CRitical infrastructure IT ( 2013 ). https:\/\/www.seccrit.eu\/. Simpson, S., Shirazi, N, Hutchison, D., Backhaus, H. 2013. Deliverable: 4.1 Anomaly Detection Techniques for Cloud Computing. The SEcure Cloud computing for CRitical infrastructure IT (2013). https:\/\/www.seccrit.eu\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE INFOCOM","volume":"2012","author":"Pascoal C.","year":"2012","unstructured":"Pascoal , C. , Oliveira , R. , Valadas , R. , Filzmoser , P. F. , Salvador P. and Pacheco A . 2012. Robust feature selection and robust PCA for internet traffic anomaly detection . In IEEE INFOCOM , vol. 2012 ( March 2012 ), 1755--1763. Pascoal, C., Oliveira, R., Valadas, R., Filzmoser, P. F., Salvador P. and Pacheco A. 2012. Robust feature selection and robust PCA for internet traffic anomaly detection. In IEEE INFOCOM, vol. 2012 (March 2012), 1755--1763."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.01.005"},{"key":"e_1_3_2_1_7_1","unstructured":"Zhang H. 2004. The optimality of na\u00efve bayes. AA 1(2):3 (2004)  Zhang H. 2004. The optimality of na\u00efve bayes. AA 1(2):3 (2004)"},{"key":"e_1_3_2_1_8_1","unstructured":"Bishop C. M. and Nasrabadi N. M. 2006. Pattern recognition and machine learning vol. 1 Springer New York.   Bishop C. M. and Nasrabadi N. M. 2006. Pattern recognition and machine learning vol. 1 Springer New York."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 23rd National Information Systems Security Conference","author":"Rhodes B. C.","year":"2000","unstructured":"Rhodes , B. C. , Mahaffey , J. A. and Cannady , J. D . 2000. Multiple Self-Organizing Maps for Intrusion Detection . In Proceedings of the 23rd National Information Systems Security Conference ( 2000 ). Rhodes, B. C., Mahaffey, J. A. and Cannady, J. D. 2000. Multiple Self-Organizing Maps for Intrusion Detection. In Proceedings of the 23rd National Information Systems Security Conference (2000)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560326_27"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2010.9"},{"volume-title":"International Symposium on Computer Network and Multimedia Technology (Wuhan, 2009), CNMT 2009, IEEE Computer Society, 1--3.","author":"Zhang W.","key":"e_1_3_2_1_12_1","unstructured":"Zhang , W. and Yang , O . 2009. A survey of anomaly detection methods in networks . In International Symposium on Computer Network and Multimedia Technology (Wuhan, 2009), CNMT 2009, IEEE Computer Society, 1--3. Zhang, W. and Yang, O. 2009. A survey of anomaly detection methods in networks. In International Symposium on Computer Network and Multimedia Technology (Wuhan, 2009), CNMT 2009, IEEE Computer Society, 1--3."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.36"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/2344839"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11861898_38"},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal of Mathematical Models and Methods in Applied Sciences, issue 4","author":"Cha S.-H.","year":"2007","unstructured":"Cha , S.-H. 2007. Comprehensive Survey on Distance\/Similarity Measures between probability Density Functions . International Journal of Mathematical Models and Methods in Applied Sciences, issue 4 , vol. 1 ( 2007 ). Cha, S.-H. 2007. Comprehensive Survey on Distance\/Similarity Measures between probability Density Functions. International Journal of Mathematical Models and Methods in Applied Sciences, issue 4, vol. 1 (2007)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.09.010"}],"event":{"name":"16th EANN workshops: 16th Engineering Applications of Neural Networks Conference WORKSHOPS","sponsor":["Aristotle University of Thessaloniki","INNS International Neural Network Society"],"location":"Rhodes Island Greece","acronym":"16th EANN workshops"},"container-title":["Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2797143.2797145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2797143.2797145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:29Z","timestamp":1750225409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2797143.2797145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,25]]},"references-count":18,"alternative-id":["10.1145\/2797143.2797145","10.1145\/2797143"],"URL":"https:\/\/doi.org\/10.1145\/2797143.2797145","relation":{},"subject":[],"published":{"date-parts":[[2015,9,25]]},"assertion":[{"value":"2015-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}