{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:18Z","timestamp":1750306278244,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905175","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion Detection System Using Genetic Algorithm for Cloud"],"prefix":"10.1145","author":[{"given":"Tanya","family":"Singh","sequence":"first","affiliation":[{"name":"Amity University of Information Technology, Amity University, Uttar Pradesh, Noida"}]},{"given":"Seema","family":"Verma","sequence":"additional","affiliation":[{"name":"Department of Electronics, Banasthali University, Rajasthan"}]},{"given":"Vartika","family":"Kulshrestha","sequence":"additional","affiliation":[{"name":"Department of Electronics, Banasthali University, Rajasthan"}]},{"given":"Sumeet","family":"Katiyar","sequence":"additional","affiliation":[{"name":"Amity University of Information Technology, Amity University Uttar Pradesh, Noida"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"18","volume-title":"JNTUA, Anatapur","year":"2012","unstructured":"V.G.R ( 2012 ), An Efficient Security Model in Cloud Computing based on Soft computing Techniques , JNTUA, Anatapur , IEEE : pages 18 -- 23 . V.G.R (2012), An Efficient Security Model in Cloud Computing based on Soft computing Techniques, JNTUA, Anatapur, IEEE: pages 18--23."},{"key":"e_1_3_2_1_2_1","first-page":"136","volume-title":"Oracle India Pvt. ltd., IJCSITS","author":"Prasad Padhy R.","year":"2011","unstructured":"R. Prasad Padhy ( 2011 ), Cloud Computing: Security Issues and Research Challenges , Oracle India Pvt. ltd., IJCSITS : pages 136 -- 146 . R.Prasad Padhy (2011), Cloud Computing: Security Issues and Research Challenges, Oracle India Pvt. ltd., IJCSITS: pages 136--146."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.46"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"A Survey on Intrusion Detection in Wireless Sensor Networks","author":"Goyal K.","year":"2013","unstructured":"K. Goyal ( 2013 ), A Survey on Intrusion Detection in Wireless Sensor Networks , Galgotias University , Greater Noida , IJSRET pages: 1 -- 14 . K. Goyal (2013), A Survey on Intrusion Detection in Wireless Sensor Networks, Galgotias University, Greater Noida, IJSRET pages: 1--14."},{"key":"e_1_3_2_1_5_1","unstructured":"M. M. Taher Jawhar(2010) Anomaly Intrusion Detection System using Hamming Network Approach Jamia Millia Islamia IJCSC pages: 165--169.  M. M. Taher Jawhar(2010) Anomaly Intrusion Detection System using Hamming Network Approach Jamia Millia Islamia IJCSC pages: 165--169."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Layered Approach for Intrusion Detection Systems Based GeneticAlgorithm","author":"Padmadas M.","year":"2013","unstructured":"M. Padmadas ( 2013 ), Layered Approach for Intrusion Detection Systems Based GeneticAlgorithm , Manonmaniam Sundaranar University , IEEE : pages 1 -- 4 . M.Padmadas (2013), Layered Approach for Intrusion Detection Systems Based GeneticAlgorithm, Manonmaniam Sundaranar University, IEEE: pages 1--4."},{"key":"e_1_3_2_1_7_1","first-page":"25","volume-title":"Cloud Computing And Security Issues In The Cloud","author":"Ahmed M.","year":"2014","unstructured":"M. Ahmed ( 2014 ), Cloud Computing And Security Issues In The Cloud , Daffodil Institute of IT , Dhaka, Bangladesh , IJNSA pages: 25 -- 36 . M. Ahmed (2014), Cloud Computing And Security Issues In The Cloud, Daffodil Institute of IT, Dhaka, Bangladesh, IJNSA pages: 25--36."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2011.103"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Dept. of Electronics, Banasthali, Rajasthan","author":"Verma S.","year":"2012","unstructured":"S. Verma ( 2012 ), Automated Multilevel Defence Model to Investigate Packets for Web Interface , Dept. of Electronics, Banasthali, Rajasthan , IEEE : pages 1 -- 6 . S. Verma (2012), Automated Multilevel Defence Model to Investigate Packets for Web Interface, Dept. of Electronics, Banasthali, Rajasthan, IEEE: pages 1--6."},{"volume-title":"IJCA: pages: 18--23.","year":"2012","key":"e_1_3_2_1_10_1","unstructured":"V.G.R ( 2012 ), An Efficient Security Model in Cloud Computing based on Soft computing Techniques , IJCA: pages: 18--23. V.G.R (2012), An Efficient Security Model in Cloud Computing based on Soft computing Techniques, IJCA: pages: 18--23."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Vasslis Dimopoulous Ioannis Papaefstathiou Dionisios Pnevmatikatos. A memory efficient reconfigurable Aho-Corasick FSM implementation for intrusion detection system. 2007 IEEE  Vasslis Dimopoulous Ioannis Papaefstathiou Dionisios Pnevmatikatos. A memory efficient reconfigurable Aho-Corasick FSM implementation for intrusion detection system. 2007 IEEE","DOI":"10.1109\/ICSAMOS.2007.4285750"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132462.1132464"},{"key":"e_1_3_2_1_13_1","volume-title":"Adaptation in natural and artificial systems","author":"Holland J.","year":"1975","unstructured":"J. Holland , Adaptation in natural and artificial systems , University of Michigan Press , Ann Arbor , 1975 . J. Holland, Adaptation in natural and artificial systems, University of Michigan Press, Ann Arbor, 1975."},{"issue":"5","key":"e_1_3_2_1_14_1","volume":"43","author":"Man K. F.","year":"1996","unstructured":"K. F. Man , Member, IEEE, K. S. Tang , and S. Kwong , Member, IEEE, \"Genetic Algorithms: Concepts and Applications\", IEEE Transactions On Industrial Electronics , Vol. 43 , No. 5 , October 1996 K. F. Man, Member, IEEE, K. S. Tang, and S. Kwong, Member, IEEE, \"Genetic Algorithms: Concepts and Applications\", IEEE Transactions On Industrial Electronics, Vol. 43, No. 5, October 1996","journal-title":"IEEE Transactions On Industrial Electronics"},{"issue":"4","key":"e_1_3_2_1_15_1","volume":"3","author":"Sharma Manju","year":"2013","unstructured":"Manju Sharma , Girdhar Gopal , \" Hill Climbing Based Hybrid Crossover in Genetic Algorithms\" , International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3 , Issue 4 , April 2013 Manju Sharma, Girdhar Gopal, \"Hill Climbing Based Hybrid Crossover in Genetic Algorithms\", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_16_1","volume-title":"International Journal of Network Security & Its Applications (IJNSA)","volume":"4","author":"Hoque Mohammad Sazzadul","unstructured":"Mohammad Sazzadul Hoque , Md. Abdul Mukit , Md. Abu Naser Bikas, \"An Implementation Of Intrusion Detection System Using Genetic Algorithm \", International Journal of Network Security & Its Applications (IJNSA) , Vol. 4 , No. 2, March 2012 Mohammad Sazzadul Hoque, Md. Abdul Mukit, Md. Abu Naser Bikas, \"An Implementation Of Intrusion Detection System Using Genetic Algorithm\", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, March 2012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2002.1007886"},{"key":"e_1_3_2_1_18_1","first-page":"585","volume-title":"Proceedings of the ITI 2011 33rd International Conference on, vol., no.","year":"2011","unstructured":"Brodanac, P.; Budin, L.; Jakobovic, D., \"Parallelized Rabin-Karp method for exact string matching,\" Information Technology Interfaces (ITI) , Proceedings of the ITI 2011 33rd International Conference on, vol., no. , pp. 585 -- 590 , 27-30 June 2011 Brodanac, P.; Budin, L.; Jakobovic, D., \"Parallelized Rabin-Karp method for exact string matching,\" Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on, vol., no., pp. 585--590, 27-30 June 2011"},{"key":"e_1_3_2_1_19_1","first-page":"238","volume-title":"Comparing Local Search with respect to Genetic Evolution to Detect Intrusions in Computer Networks","author":"Neri F.","year":"2000","unstructured":"F. Neri ( 2000 ), Comparing Local Search with respect to Genetic Evolution to Detect Intrusions in Computer Networks , University of Piemonte Orientale , IEEE: pages 238 -- 243 . F.Neri (2000), Comparing Local Search with respect to Genetic Evolution to Detect Intrusions in Computer Networks, University of Piemonte Orientale, IEEE: pages 238--243."},{"key":"e_1_3_2_1_20_1","first-page":"133","volume-title":"A Hybrid Genetic Algorithm for the Provision of Isochronous Service in High Speed Networks","author":"Markaki M.","year":"1997","unstructured":"M. Markaki ( 1997 ), A Hybrid Genetic Algorithm for the Provision of Isochronous Service in High Speed Networks , Computer Science Institute Foundation for Research and Technology , IEEE : pages 133 -- 137 . M. Markaki (1997), A Hybrid Genetic Algorithm for the Provision of Isochronous Service in High Speed Networks, Computer Science Institute Foundation for Research and Technology, IEEE: pages 133--137."},{"key":"e_1_3_2_1_21_1","first-page":"564","volume-title":"Intrusion Detection System Using Genetic Algorithm","author":"Benaicha S. Eddine","year":"2014","unstructured":"S. Eddine Benaicha ( 2014 ), Intrusion Detection System Using Genetic Algorithm , University of Mohamed Boudiaf of M'Sila , IEEE: pages 564 -- 568 . S. Eddine Benaicha (2014), Intrusion Detection System Using Genetic Algorithm, University of Mohamed Boudiaf of M'Sila, IEEE: pages 564--568."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":21,"alternative-id":["10.1145\/2905055.2905175","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905175","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}