{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:29:50Z","timestamp":1769185790992,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,19]]},"DOI":"10.1145\/3459104.3459135","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T22:48:58Z","timestamp":1626821338000},"page":"175-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Network Forensics Investigation in Virtual Data Centers Using ELK"],"prefix":"10.1145","author":[{"given":"P.","family":"Rajesh","sequence":"first","affiliation":[{"name":"K L Deemed to be University, India"}]},{"given":"Mohammed","family":"Ismail. Ismail. B.","sequence":"additional","affiliation":[{"name":"Kannur University campus Mangattuparamba, India"}]},{"given":"Mansoor","family":"Alam","sequence":"additional","affiliation":[{"name":"NIU, USA"}]},{"given":"Mansour","family":"Tahernezhadi","sequence":"additional","affiliation":[{"name":"Northern Illinois University, USA"}]},{"given":"Monika","family":"A.","sequence":"additional","affiliation":[{"name":"Sanjivani College of Engineering, Maharashtra, India"}]}],"member":"320","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2018 2nd International Conference on Inventive Systems and Control (ICISC).","author":"Sameer Dharur K.","unstructured":"Sameer Dharur ; K. Swaminathan ,Efficient surveillance and monitoring using the ELK stack for IoT powered Smart Buildings , 2018 2nd International Conference on Inventive Systems and Control (ICISC). Sameer Dharur ; K. Swaminathan ,Efficient surveillance and monitoring using the ELK stack for IoT powered Smart Buildings, 2018 2nd International Conference on Inventive Systems and Control (ICISC)."},{"key":"e_1_3_2_1_2_1","volume-title":"Challenges of Network Forensic Investigation in Virtual NetworksGermanyJournal of Cyber Security","author":"FernUniversit\u00a8at Hagen","year":"2017","unstructured":"FernUniversit\u00a8at Hagen , Germany Hochschule Ravensburg-Weingarten , Challenges of Network Forensic Investigation in Virtual NetworksGermanyJournal of Cyber Security , Vol. 5 2, 15\u201346. doi: 10.13052\/jcsm2245-1439.522. 2017 . 10.13052\/jcsm2245-1439.522.2017 FernUniversit\u00a8at Hagen, Germany Hochschule Ravensburg-Weingarten, Challenges of Network Forensic Investigation in Virtual NetworksGermanyJournal of Cyber Security, Vol. 5 2, 15\u201346. doi: 10.13052\/jcsm2245-1439.522.2017."},{"key":"e_1_3_2_1_3_1","volume-title":"A Stateless Transport Tunneling Protocol for Network Virtualization. Internet Draft","author":"Davie B.","year":"2016","unstructured":"Davie , B. and Gross , J . ( 2016 ). A Stateless Transport Tunneling Protocol for Network Virtualization. Internet Draft , Informational : New York, NY. Davie, B. and Gross, J. (2016). A Stateless Transport Tunneling Protocol for Network Virtualization. Internet Draft, Informational: New York, NY."},{"key":"e_1_3_2_1_4_1","first-page":"909","article-title":"Datacenter network virtualization: A survey","volume":"15","author":"Faizul M.","year":"2013","unstructured":"Faizul , M. , Boutaba , B. R. , Esteves , R. , Granville , L. Z. , Podlesny , M. D. , Rabbani , G. , ( 2013 ). Datacenter network virtualization: A survey . IEEE 15 , 909 \u2013 928 . Faizul, M., Boutaba, B. R., Esteves, R., Granville, L. Z., Podlesny,M. D.,Rabbani, G., (2013). Datacenter network virtualization: A survey. IEEE 15, 909\u2013928.","journal-title":"IEEE"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.005"},{"key":"e_1_3_2_1_7_1","unstructured":"https:\/\/www.elastic.co\/guide\/en\/kibana\/current\/xpack-ml.html  https:\/\/www.elastic.co\/guide\/en\/kibana\/current\/xpack-ml.html"},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/www.elastic.co\/guide\/en\/elastic-stack-get-started\/current\/get-started-elastic-stack.html  https:\/\/www.elastic.co\/guide\/en\/elastic-stack-get-started\/current\/get-started-elastic-stack.html"},{"issue":"4","key":"e_1_3_2_1_9_1","first-page":"30","article-title":"Design and Implementation of a Monitoring Solution for Large-Scale MongoDB Clusters","volume":"10","author":"Li Y.T.","year":"2019","unstructured":"Li , Y.T. , Zhang , H.M. and Li , J.H. ( 2019 ) \u2018 Design and Implementation of a Monitoring Solution for Large-Scale MongoDB Clusters \u2019, E-science Technology & Application , Vol. 10 , No. 4 , pp. 30 - 40 . Li, Y.T., Zhang, H.M. and Li, J.H. (2019) \u2018Design and Implementation of a Monitoring Solution for Large-Scale MongoDB Clusters\u2019, E-science Technology & Application, Vol. 10, No. 4, pp. 30-40.","journal-title":"E-science Technology & Application"},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"2017134","article-title":"Research on artificial intelligence technology and the future intelligent information service architecture","volume":"33","author":"Wang Z.H.","year":"2017","unstructured":"Wang , Z.H. and Yang , Z. ( 2017 ) \u2018 Research on artificial intelligence technology and the future intelligent information service architecture \u2019, Telecommunications Science , Vol. 33 , No. 5 , pp. 2017134 - 2017131 -2017134-11. Wang, Z.H. and Yang, Z. (2017) \u2018Research on artificial intelligence technology and the future intelligent information service architecture\u2019, Telecommunications Science, Vol. 33, No. 5, pp. 2017134-1-2017134-11.","journal-title":"Telecommunications Science"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sherenaz Al-Haj Baddar Alessio Merlo Mauro Migliardi \" Behavioral-Anomaly Detection in Forensics Analysis\" IEEE Security & Privacy Jan 2019.  Sherenaz Al-Haj Baddar Alessio Merlo Mauro Migliardi \" Behavioral-Anomaly Detection in Forensics Analysis\" IEEE Security & Privacy Jan 2019.","DOI":"10.1109\/MSEC.2019.2894917"},{"key":"e_1_3_2_1_12_1","volume-title":"Journal of Network and Computer Applications","author":"Suleman Khan","year":"2016","unstructured":"Suleman Khan , Abdullah Gani, Ainuddin Wahid Abdul Wahab , Muhammad Shiraz, Iftikhar Ahmad khan, \" Network forensics : Review, taxonomy, and open,challenges \", Journal of Network and Computer Applications , Mar , 2016 . Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, Iftikhar Ahmad khan, \" Network forensics: Review, taxonomy, and open,challenges\", Journal of Network and Computer Applications, Mar, 2016."},{"key":"e_1_3_2_1_13_1","unstructured":"Automating Threat Intelligence for SDL Raghudeep Kannavara ; Jacob Vangore; William Roberts ; Marcus Lindholm ; Priti Shrivastav 2018 IEEE Cybersecurity Development (SecDev).  Automating Threat Intelligence for SDL Raghudeep Kannavara ; Jacob Vangore; William Roberts ; Marcus Lindholm ; Priti Shrivastav 2018 IEEE Cybersecurity Development (SecDev)."},{"key":"e_1_3_2_1_14_1","volume-title":"Ehab Al-Shaer 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).","author":"Using Entropy","unstructured":"Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat IntelligenceGhaith Husari ; Xi Niu ; Bill Chu ; Ehab Al-Shaer 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat IntelligenceGhaith Husari ; Xi Niu ; Bill Chu ; Ehab Al-Shaer 2018 IEEE International Conference on Intelligence and Security Informatics (ISI)."},{"key":"e_1_3_2_1_15_1","volume-title":"Support vector machines versus convolutional neural networksIsuf Deliu","author":"Extracting","year":"2017","unstructured":"Extracting cyber threat intelligence from hacker forums : Support vector machines versus convolutional neural networksIsuf Deliu ; Carl Leichter; Katrin Franke 2017 IEEE International Conference on Big Data (Big Data) . Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networksIsuf Deliu ; Carl Leichter; Katrin Franke 2017 IEEE International Conference on Big Data (Big Data)."},{"key":"e_1_3_2_1_16_1","unstructured":"Dr.P.Rajesh K.Vamsikrishna Reddy \"Stock trend prediction using Ensemble learning techniques in python\" International Journal of Innovative Technology and Exploring Engineering (IJITEE)-2019 Scopus.  Dr.P.Rajesh K.Vamsikrishna Reddy \"Stock trend prediction using Ensemble learning techniques in python\" International Journal of Innovative Technology and Exploring Engineering (IJITEE)-2019 Scopus."},{"key":"e_1_3_2_1_17_1","volume-title":"National Women Conference on Technological Innovations\"","author":"Dr P.","year":"2018","unstructured":"Dr . P. Rajesh , Sai Prasanna \" A Forensic Approach To Perform Android Device Analysis at National Women Conference on Technological Innovations\" , Dec 2018 . Scopus, with Best paper award of conference. Dr.P.Rajesh, Sai Prasanna \" A Forensic Approach To Perform Android Device Analysis at National Women Conference on Technological Innovations\", Dec 2018. Scopus, with Best paper award of conference."},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Soft Computing and Signal Processing. IEEE Conference-2018","author":"Dr P.","unstructured":"Dr . P. Rajesh \" A Review report on Challenges and Opportunities of Edge, Fog and Cloud Computing by employing IoT Technology \". International Conference on Soft Computing and Signal Processing. IEEE Conference-2018 .Scopus. Dr.P.Rajesh \"A Review report on Challenges and Opportunities of Edge, Fog and Cloud Computing by employing IoT Technology\". International Conference on Soft Computing and Signal Processing. IEEE Conference-2018.Scopus."},{"key":"e_1_3_2_1_19_1","unstructured":"SK.Wasim Akram P.Rajesh \"Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach\" in International Journal of Computer Trends and Technology.2015.  SK.Wasim Akram P.Rajesh \"Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach\" in International Journal of Computer Trends and Technology.2015."},{"key":"e_1_3_2_1_20_1","volume-title":"Journal of Theoretical and Applied Information Technology 96(13)","author":"Srinivas B","year":"2018","unstructured":"K. Srinivas , Mohammed Ismail. B \u201c Testcase Prioritization With Special Emphasis On Automation Testing Using Hybrid Framework \u201d Journal of Theoretical and Applied Information Technology 96(13) 4180-4190 July 2018 . K.Srinivas, Mohammed Ismail.B \u201cTestcase Prioritization With Special Emphasis On Automation Testing Using Hybrid Framework\u201d Journal of Theoretical and Applied Information Technology 96(13) 4180-4190 July 2018."},{"key":"e_1_3_2_1_21_1","volume-title":"784-788","author":"Rajesh Dr.G.","year":"2012","unstructured":"P. Rajesh , Dr.G. Narsimha , \"Fuzzy based privacy preserving classification of data streams.\" in ACM conference (CUBE), Pune , PP : 784-788 , 2012 , DBLP , ISBN : 978-1-4503-1185-4. P.Rajesh, Dr.G.Narsimha, \"Fuzzy based privacy preserving classification of data streams.\" in ACM conference (CUBE), Pune, PP: 784-788, 2012, DBLP, ISBN: 978-1-4503-1185-4."},{"key":"e_1_3_2_1_22_1","volume-title":"Journal of computational and theoretical Nanoscience 16 (12)","author":"Rahul Shahne","year":"2019","unstructured":"Rahul Shahne , Mohammed Ismail, CSR Prabhu \u201cSurvey on Deep Learning Techniques for Prognosis and Diagnosis of Cancer from Microarray Gene Expression Data \u201d Journal of computational and theoretical Nanoscience 16 (12) , 5078-5088, Dec 2019 . Rahul Shahne, Mohammed Ismail, CSR Prabhu \u201cSurvey on Deep Learning Techniques for Prognosis and Diagnosis of Cancer from Microarray Gene Expression Data\u201d Journal of computational and theoretical Nanoscience 16 (12), 5078-5088, Dec 2019."}],"event":{"name":"ISEEIE 2021: 2021 International Symposium on Electrical, Electronics and Information Engineering","location":"Seoul Republic of Korea","acronym":"ISEEIE 2021"},"container-title":["2021 International Symposium on Electrical, Electronics and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459104.3459135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459104.3459135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:03Z","timestamp":1750193223000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459104.3459135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":22,"alternative-id":["10.1145\/3459104.3459135","10.1145\/3459104"],"URL":"https:\/\/doi.org\/10.1145\/3459104.3459135","relation":{},"subject":[],"published":{"date-parts":[[2021,2,19]]},"assertion":[{"value":"2021-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}