{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:40:21Z","timestamp":1763343621495,"version":"3.45.0"},"reference-count":21,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064523","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:09:07Z","timestamp":1745968147000},"page":"1437-1456","source":"Crossref","is-referenced-by-count":0,"title":["Determination of Favorable Factors for Cloud IP Recognition Technology"],"prefix":"10.32604","volume":"84","author":[{"given":"Yuanyuan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Cunzhi","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Ang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinghui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruixia","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ruixiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the Seventh International Conference on Networking and Services (ICNS)","first-page":"141","article-title":"Network security threats and cloud infrastructure services monitoring","author":"Mukhtarov","year":"2011 May 22\u201327"},{"key":"ref2","first-page":"140","article-title":"Cloud computing for network security intrusion detection system","volume":"8","author":"Yang","year":"2013","journal-title":"J Netw"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TST.2013.6449406","article-title":"Cloud computing-based forensic analysis for collaborative network security management system","volume":"18","author":"Chen","year":"2013","journal-title":"Tsinghua Sci Technol"},{"key":"ref4","first-page":"3301","article-title":"DC-FIPD: fraudulent IP identification method based on homology detection","volume":"81","author":"Ma","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref5","unstructured":"Ali I, Sabir S, Ullah Z. Internet of things security, device authentication and access control. arXiv:1901.07309. 2019."},{"key":"ref6","series-title":"Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","first-page":"79","article-title":"Authentication and access control based on distributed ledger technology: a survey","author":"Ghaffari","year":"2020 Sep 28\u201330"},{"key":"ref7","series-title":"Proceedings of the 2014 World Congress on Computing and Communication Technologies","first-page":"280","article-title":"Wan optimization tools, techniques and research issues for cloud-based big data analytics","author":"Nirmala","year":"2014 Feb 27\u2013Mar 1"},{"key":"ref8","series-title":"Proceedings of the 2023 9th International Conference on Signal Processing and Communication (ICSC)","first-page":"274","article-title":"Data analytics technique of different ip address utilized for cloud services","author":"Wani","year":"2023 Dec 21\u201323"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/MNET.012.2100293","article-title":"Identifying IP usage scenarios: problems, data, and benchmarks","volume":"36","author":"Zhou","year":"2022","journal-title":"IEEE Netw"},{"key":"ref10","first-page":"13077","article-title":"Large-scale IP usage identification via deep ensemble learning (student abstract)","volume":"36","author":"Wang","year":"2022","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"5144","DOI":"10.1038\/s41598-024-55750-x","article-title":"Measuring and classifying IP usage scenarios: a continuous neural trees approach","volume":"14","author":"Li","year":"2024","journal-title":"Sci Rep"},{"key":"ref12","series-title":"Proceedings of the ICC 2024-IEEE International Conference on Communications","first-page":"3310","article-title":"GraphCyber: identifying IP usage scenarios for cyberspace mapping","author":"Liu","year":"2024 Jun 9\u201313"},{"key":"ref13","series-title":"Proceedings of the 2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","first-page":"1","article-title":"Features of application of machine learning methods for classification of network traffic (features, advantages, disadvantages)","author":"Nazarenko","year":"2019 Oct 1\u20134"},{"key":"ref14","series-title":"Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems","first-page":"61","article-title":"Structural analysis of network traffic flows","author":"Lakhina","year":"2004 Jun 10\u201314"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","article-title":"Analysis of network traffic features for anomaly detection","volume":"101","author":"Iglesias","year":"2015","journal-title":"Mach Learn"},{"key":"ref16","series-title":"Proceedings of the Companion Proceedings of the Web Conference","first-page":"332","article-title":"IP geolocation using traceroute location propagation and IP range location interpolation","author":"Dan","year":"2021 Apr 19\u201323"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/505659.505663","article-title":"Analysis of the autonomous system network topology","volume":"31","author":"Magoni","year":"2001","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref18","series-title":"Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies","first-page":"156","article-title":"Computing the types of the relationships between autonomous systems","author":"Di","year":"2003 Mar 30\u2013Apr 3"},{"key":"ref19","unstructured":"IPIP [Online]. [cited 2025 Feb 18]. Available from: https:\/\/www.ipip.net."},{"key":"ref20","unstructured":"ChunZhen [Online]. [cited 2025 Feb 18]. Available from: https:\/\/cz88.net\/."},{"key":"ref21","unstructured":"IP2location [Online]. [cited 2025 Feb 18]. Available from: https:\/\/www.ip2location.com."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64523\/TSP_CMC_64523.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:07Z","timestamp":1763343367000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064523","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}