{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:29:52Z","timestamp":1725910192149},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319668291"},{"type":"electronic","value":"9783319668307"}],"license":[{"start":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T00:00:00Z","timestamp":1504310400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-66830-7_5","type":"book-chapter","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T20:59:40Z","timestamp":1504213180000},"page":"43-54","source":"Crossref","is-referenced-by-count":3,"title":["Fuzzy Logic Load Balancing for Cloud Architecture Network - A Simulation Test"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Apiecionek","sequence":"first","affiliation":[]},{"given":"Jacek M.","family":"Czerniak","sequence":"additional","affiliation":[]},{"given":"Wojciech","family":"Dobrosielski","sequence":"additional","affiliation":[]},{"given":"Dawid","family":"Ewald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"unstructured":"Alliance, C.S.: Top threats to cloud computing v1. 0 (2010). http:\/\/www.cloudsecurityalliance.org\/topthreats","key":"5_CR1"},{"doi-asserted-by":"crossref","unstructured":"Apiecionek, L., Czerniak, J., Dobrosielski, W.: Quality of services method as a DDoS protection tool. In: Advances in Intelligent Systems and Computing, pp. 225\u2013234. Springer, New York (2015)","key":"5_CR2","DOI":"10.1007\/978-3-319-11310-4_20"},{"unstructured":"Apiecionek, L., Czerniak, J.M.: QoS solution for network resource protection. In: Proceedings of the Twelfth International Conference on Informatics, Informatics 2013, pp. 73\u201376 (2013)","key":"5_CR3"},{"doi-asserted-by":"crossref","unstructured":"Apiecionek, L., Czerniak, J.M., Dobrosielski, W.T.: Quality of services method as a DDoS protection tool. In: Intelligent Systems 2014, Vol. 2: Tools, Architectures, Systems, Applications, vol. 323, 225\u2013234 (2015)","key":"5_CR4","DOI":"10.1007\/978-3-319-11310-4_20"},{"doi-asserted-by":"crossref","unstructured":"Apiecionek, L., Czerniak, J.M., Ewald, D.: New QoS Concept for Protecting Network Resources, pp. 234\u2013239. Springer International Publishing, Cham (2017)","key":"5_CR5","DOI":"10.1007\/978-3-319-47274-4_28"},{"key":"5_CR6","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-319-06932-6_39","volume":"424","author":"L Apiecionek","year":"2014","unstructured":"Apiecionek, L., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. Beyond Databases, Archit. Struct., BDAS 424, 405\u2013414 (2014)","journal-title":"Beyond Databases, Archit. Struct., BDAS"},{"doi-asserted-by":"crossref","unstructured":"Apiecionek, \u0141., Sobczak, M., Makowski, W., Vince, T.: Multi path transmission control protocols as a security solution. In: 2015 IEEE 13th International Scientific Conference on Informatics, pp. 27\u201331. IEEE (2015)","key":"5_CR7","DOI":"10.1109\/Informatics.2015.7377802"},{"unstructured":"Apiecionek, M., et al.: Biblioteka przy parafii pw. \u015bwi\u0119tych polskich braci m\u0119czennik\u00f3w w bydgoszczy. Fides. Biuletyn Bibliotek Ko\u015bcielnych 21(41(2)), 73\u201380 (2015)","key":"5_CR8"},{"key":"5_CR9","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1007\/978-3-319-18422-7_46","volume":"521","author":"J Czerniak","year":"2015","unstructured":"Czerniak, J., Ewald, D., Macko, M., Smigielski, G., Tyszczuk, K.: Approach to the monitoring of energy consumption in Eco-grinder based on ABC optimization. Beyond Databases Archit. Struct. BDAS 521, 516\u2013529 (2015)","journal-title":"Beyond Databases Archit. Struct. BDAS"},{"issue":"1\u20132","key":"5_CR10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3233\/FI-2009-0065","volume":"92","author":"J Czerniak","year":"2009","unstructured":"Czerniak, J.: Evolutionary approach to data discretization for rough sets theory. Fundamenta Informaticae 92(1\u20132), 43\u201361 (2009)","journal-title":"Fundamenta Informaticae"},{"unstructured":"Czerniak, J.M., Dobrosielski, W., Zarzycki, H., Apiecionek, L.: A proposal of the new owlANT method for determining the distance between terms in ontology. Intelligent Systems 2014, Vol. 2: Tools, Architectures, Systems, Applications, vol. 323, 235\u2013246 (2015)","key":"5_CR11"},{"doi-asserted-by":"crossref","unstructured":"Czerniak, J.M., Dobrosielski, W.T., Apiecionek, \u0141., Ewald, D., Paprzycki, M.: Practical application of OFN arithmetics in a crisis control center monitoring, pp. 51\u201364. Springer International Publishing, Cham (2016)","key":"5_CR12","DOI":"10.1007\/978-3-319-40132-4_4"},{"doi-asserted-by":"crossref","unstructured":"Czerniak, J.M., Ewald, D., \u015amigielski, G., Dobrosielski, W.T., Apiecionek, \u0141.: Optimization of fuel consumption in firefighting water capsule Flights of a Helicopter, pp. 39\u201349. Springer International Publishing, Cham (2016)","key":"5_CR13","DOI":"10.1007\/978-3-319-40132-4_3"},{"doi-asserted-by":"crossref","unstructured":"Czerniak, J.M., Zarzycki, H.: Artificial acari optimization as a new strategy for global optimization of multimodal functions. J. Comput. Sci. 348, 1\u201322 (2017)","key":"5_CR14","DOI":"10.1016\/j.jocs.2017.05.028"},{"unstructured":"Czerniak, J.M., Zarzycki, H., Ewald, D.: AAO as a new strategy in modeling and simulation of constructional problems optimization. In: Simulation Modelling Practice and Theory (2017). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1569190X17300709","key":"5_CR15"},{"key":"5_CR16","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/978-3-319-26211-6_27","volume":"401","author":"J Czerniak","year":"2016","unstructured":"Czerniak, J., Apiecionek, \u0141., Zarzycki, H., Ewald, D.: Proposed CAEva simulation method for evacuation of people from a buildings on fire. Adv. Intell. Syst. Comput. 401, 315\u2013326 (2016)","journal-title":"Adv. Intell. Syst. Comput."},{"doi-asserted-by":"crossref","unstructured":"Czerniak, J., Dobrosielski, W., Apiecionek, L.: Representation of a trend in OFN during fuzzy observance of the water level from the crisis control center. In: Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE Digital Library, ACSIS, vol. 5, pp. 443-447 (2015)","key":"5_CR17","DOI":"10.15439\/2015F217"},{"key":"5_CR18","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-319-26211-6_28","volume":"401","author":"J Czerniak","year":"2016","unstructured":"Czerniak, J., Macko, M., Ewald, D.: The cutmag as a new hybrid method for multi-edge grinder design optimization. Adv. Intell. Syst. Comput. 401, 327\u2013337 (2016)","journal-title":"Adv. Intell. Syst. Comput."},{"doi-asserted-by":"crossref","unstructured":"Czerniak, J., Smigielski, G., Ewald, D., Paprzycki, M.: New proposed implementation of ABC method to optimization of water capsule flight. In: Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE Digital Library, ACSIS, vol. 5, pp. 489-493 (2015)","key":"5_CR19","DOI":"10.15439\/2015F242"},{"doi-asserted-by":"crossref","unstructured":"Ewald, D., Czerniak, J.M., Zarzycki, H.: Approach to solve a criteria problem of the ABC algorithm used to the WBDP multicriteria optimization. In: Intelligent Systems 2014, Vol. 1: Mathematical Foundations, Theory, Analyses, vol. 322, pp. 129\u2013137 (2015)","key":"5_CR20","DOI":"10.1007\/978-3-319-11313-5_12"},{"unstructured":"Horrigan, J.B.: Cloud computing gains in currency (2008). http:\/\/pewresearch.org\/pubs\/948\/cloud-computing-gains-in-currency","key":"5_CR21"},{"issue":"6","key":"5_CR22","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1109\/TFUZZ.2013.2243456","volume":"21","author":"W Kosinski","year":"2013","unstructured":"Kosinski, W., Prokopowicz, P., Rosa, A.: Defuzzification functionals of ordered fuzzy numbers. IEEE Trans. Fuzzy Syst. 21(6), 1163\u20131169 (2013)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"1","key":"5_CR23","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1093\/jigpal\/jzw044","volume":"25","author":"R Kozik","year":"2017","unstructured":"Kozik, R., Chora\u015b, M., Ho\u0142ubowicz, W.: Packets tokenization methods for web layer cyber security. Logic J. IGPL 25(1), 103\u2013113 (2017)","journal-title":"Logic J. IGPL"},{"doi-asserted-by":"crossref","unstructured":"Kozik, R., Chora\u015b, M., Renk, R., Ho\u0142ubowicz, W.: Cyber security of the application layer of mission critical industrial systems. In: IFIP International Conference on Computer Information Systems and Industrial Management, pp. 342\u2013351. Springer, New York (2016)","key":"5_CR24","DOI":"10.1007\/978-3-319-45378-1_31"},{"doi-asserted-by":"crossref","unstructured":"Mace, J.C., Van Moorsel, A., Watson, P.: The case for dynamic security solutions in public cloud workflow deployments. In: 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops, pp. 111\u2013116. IEEE (2011)","key":"5_CR25","DOI":"10.1109\/DSNW.2011.5958795"},{"unstructured":"Macko, M., Flizikowski, J.: The method of the selection of comminution design for non-brittle materials. In: AIChE Annual Meeting, Conference Proceedings (2010)","key":"5_CR26"},{"doi-asserted-by":"crossref","unstructured":"Macko, M., Flizikowski, J., Szczepa\u0144ski, Z., Tyszczuk, K., \u015amigielski, G., Mrozi\u0144ski, A., Czerniak, J., Tomporowski, A.: CAD\/CAE Applications in Mill\u2019s Design and Investigation, pp. 343\u2013351. Springer International Publishing, Cham (2017)","key":"5_CR27","DOI":"10.1007\/978-3-319-50938-9_35"},{"doi-asserted-by":"crossref","unstructured":"Palka, R., Makowski, W., Wozniak, M., Brazkiewicz, P., Wosinski, K., Baturo, P., Terlecki, M., Gromacki, T.: QoS mechanism for low speed radio networks-case study. In: International Conference on Image Processing and Communications, pp. 240\u2013246. Springer, New York (2016)","key":"5_CR28","DOI":"10.1007\/978-3-319-47274-4_29"},{"issue":"4","key":"5_CR29","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MIC.2011.98","volume":"15","author":"S Pearson","year":"2011","unstructured":"Pearson, S.: Toward accountability in the cloud. IEEE Internet Comput. 15(4), 64\u201369 (2011)","journal-title":"IEEE Internet Comput."},{"key":"5_CR30","first-page":"103","volume":"2","author":"PD Sharma","year":"2012","unstructured":"Sharma, P.D.: A classification of distinct vulnerabilities in cloud computing. World J. Sci. Technol. 2, 103 (2012)","journal-title":"World J. Sci. Technol."},{"issue":"1","key":"5_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Fuzzy Logic and Technology 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66830-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T06:39:44Z","timestamp":1692945584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66830-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,2]]},"ISBN":["9783319668291","9783319668307"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66830-7_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,2]]}}}