{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:30:38Z","timestamp":1767007838870,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973626","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"1314-1318","source":"Crossref","is-referenced-by-count":13,"title":["Cloud computing threats classification model based on the detection feasibility of machine learning algorithms"],"prefix":"10.23919","author":[{"given":"Z.","family":"Masetic","sequence":"first","affiliation":[]},{"given":"K.","family":"Hajdarevic","sequence":"additional","affiliation":[]},{"given":"N.","family":"Dogru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering","year":"2007","author":"maglogiannis","key":"ref33"},{"journal-title":"Data Mining - Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"ref32"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664371"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsea.2013.3505"},{"key":"ref12","article-title":"Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey","author":"hashemi","year":"2012","journal-title":"International Journal of Applied Information Systems (IJAIS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345474"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2539150.2539222"},{"journal-title":"About CSA","year":"0","key":"ref15"},{"key":"ref16","article-title":"The Treacherous 12 Cloud Computing Top Threats in 2016","author":"top","year":"2016","journal-title":"Cloud Security Alliance"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2011.176"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2013.25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.70"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.101"},{"key":"ref3","article-title":"Cloud Computing Attacks: A Discussion With Solutions","volume":"1","author":"singh","year":"2014","journal-title":"Open Journal of Mobile Computing and Cloud Computing"},{"journal-title":"Breach Level Index","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389649"},{"journal-title":"Using MIS","year":"2014","author":"kroenke","key":"ref5"},{"journal-title":"Most Common Causes of Data Breaches","year":"2015","author":"collar","key":"ref8"},{"journal-title":"10% of phishing scams lead data breach","year":"2016","author":"kuchler","key":"ref7"},{"journal-title":"Skype - the journey we've been on","year":"2016","key":"ref2"},{"key":"ref9","article-title":"A Generalized Threat Taxonomy for Cloud Computing","author":"ahmed","year":"2014","journal-title":"The 25th Australasian Conference on Information Systems"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-241-4","author":"antonopoulos","year":"2010","journal-title":"Cloud Computing Principles Systems and Applications"},{"key":"ref20","article-title":"Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines","volume":"2","author":"bhat","year":"2013","journal-title":"International Journal of Application or Innovation in Engineering & Management (IJAIEM)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2012.6158817"},{"key":"ref21","article-title":"A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures","author":"chen","year":"2015","journal-title":"Big Data Research"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sec.621"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2012.6396086"},{"key":"ref26","article-title":"Detection of MalW. and Kernel-level Rootkits in Cloud Computing Environment","author":"win","year":"2015","journal-title":"IEEE 2nd International Conference on Cyber Security and Cloud Computing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/APWCCSE.2015.7476124"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973626.pdf?arnumber=7973626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:49:59Z","timestamp":1569930599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973626","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}