{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:38Z","timestamp":1750221278858,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,13]]},"DOI":"10.1145\/3136825.3136905","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"188-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A framework for data security in cloud using collaborative intrusion detection scheme"],"prefix":"10.1145","author":[{"given":"Upasana","family":"Nagar","sequence":"first","affiliation":[{"name":"University of Technology Sydney"}]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[{"name":"University of Technology Sydney"}]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[{"name":"University of Technology Sydney"}]},{"given":"Zhiyuan(Thomas)","family":"Tan","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University"}]}],"member":"320","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADVCOMP.2009.34"},{"volume-title":"Europe and MENA Cooperation Advances in Information and Communication Technologies","author":"Derfouf Mostapha","key":"e_1_3_2_1_4_1","unstructured":"Mostapha Derfouf , Mohsine Eleuldj , Saad Enniari , and Ouafaa Diouri . 2017. Smart Intrusion Detection Model for the Cloud Computing . In Europe and MENA Cooperation Advances in Information and Communication Technologies . Springer , 411--421. Mostapha Derfouf, Mohsine Eleuldj, Saad Enniari, and Ouafaa Diouri. 2017. Smart Intrusion Detection Model for the Cloud Computing. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer, 411--421."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738445"},{"key":"e_1_3_2_1_6_1","first-page":"191","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","volume":"3","author":"Garfinkel Tal","year":"2003","unstructured":"Tal Garfinkel , Mendel Rosenblum , 2003 . A Virtual Machine Introspection Based Architecture for Intrusion Detection .. In Ndss , Vol. 3. 191 -- 206 . Tal Garfinkel, Mendel Rosenblum, et al. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection.. In Ndss, Vol. 3. 191--206.","journal-title":"Ndss"},{"key":"e_1_3_2_1_7_1","volume-title":"International Symposium on Web Information Systems and Applications (WISA). 84--87","author":"Guan Yizhang","year":"2009","unstructured":"Yizhang Guan and Jianghong Bao . 2009 . A cp intrusion detection strategy on cloud computing . In International Symposium on Web Information Systems and Applications (WISA). 84--87 . Yizhang Guan and Jianghong Bao. 2009. A cp intrusion detection strategy on cloud computing. In International Symposium on Web Information Systems and Applications (WISA). 84--87."},{"key":"e_1_3_2_1_8_1","unstructured":"Dan Hubbard Michael Sutton etal 2010. Top threats to cloud computing v1. 0. Cloud Security Alliance (2010).  Dan Hubbard Michael Sutton et al. 2010. Top threats to cloud computing v1. 0. Cloud Security Alliance (2010)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.010"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.46"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2911-7_8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Peter Mell Tim Grance etal 2011. The NIST definition of cloud computing. (2011).  Peter Mell Tim Grance et al. 2011. The NIST definition of cloud computing. (2011).","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1805-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597201"},{"key":"e_1_3_2_1_21_1","unstructured":"Martin Roesch and Chris Green. 2016. Snort Users Manual 2.9. 8.2. (2016).  Martin Roesch and Chris Green. 2016. Snort Users Manual 2.9. 8.2. (2016)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.151"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.94"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.002"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_3_2_1_26_1","volume-title":"Song Wang, and Jiankun Hu.","author":"Tan Zhiyuan","year":"2014","unstructured":"Zhiyuan Tan , Upasana T Nagar , Xiangjian He , Priyadarsi Nanda , Ren Ping Liu , Song Wang, and Jiankun Hu. 2014 . Enhancing big data security with collaborative intrusion detection. IEEE cloud computing 1, 3 (2014), 27--33. Zhiyuan Tan, Upasana T Nagar, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Song Wang, and Jiankun Hu. 2014. Enhancing big data security with collaborative intrusion detection. IEEE cloud computing 1, 3 (2014), 27--33."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"}],"event":{"name":"SIN '17: Security of Information and Networks","acronym":"SIN '17","location":"Jaipur India"},"container-title":["Proceedings of the 10th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136825.3136905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:17Z","timestamp":1750212677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":26,"alternative-id":["10.1145\/3136825.3136905","10.1145\/3136825"],"URL":"https:\/\/doi.org\/10.1145\/3136825.3136905","relation":{},"subject":[],"published":{"date-parts":[[2017,10,13]]},"assertion":[{"value":"2017-10-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}