{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:33:36Z","timestamp":1729618416266,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cloud.2016.0087","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T02:21:01Z","timestamp":1484878861000},"page":"616-623","source":"Crossref","is-referenced-by-count":5,"title":["Anomaly Detection in the Cloud Using Data Density"],"prefix":"10.1109","author":[{"given":"Syed Noorulhassan","family":"Shirazi","sequence":"first","affiliation":[]},{"given":"Steven","family":"Simpson","sequence":"additional","affiliation":[]},{"given":"Antonios","family":"Gouglidis","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Mauthe","sequence":"additional","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-015-0290-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.17"},{"volume":"92","journal-title":"Evolving Rule-Based Models A Tool for Design of Flexible Adaptive Systems","year":"2002","key":"ref31"},{"volume":"1","journal-title":"Autonomous Learning Systems from Data to Knowledge in Real Time","year":"2012","key":"ref30"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968968"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990537"},{"key":"ref13","first-page":"96","article-title":"Online detection of utility cloud anomalies using metric distributions","author":"wang","year":"2010","journal-title":"Network Operations and Management Symposium (NOMS) 2010 IEEE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2013.29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282383"},{"journal-title":"HP Systems Insight Manager","year":"0","key":"ref16"},{"journal-title":"Tivoli network manager","year":"0","key":"ref17"},{"journal-title":"Ganglia monitoring system","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1659753.1659757"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA.2010.5524432"},{"key":"ref4","article-title":"The changing state of cloud security","author":"logic","year":"2015","journal-title":"Tech Rep"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS.2011.5945926"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755926"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.12.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2003.08.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSurv.2012.6218402"},{"key":"ref8","article-title":"The power of cloud. driving business model innovation","author":"berman","year":"2012","journal-title":"IBM Institute for Business Value"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2011.6060083"},{"key":"ref2","first-page":"8","article-title":"Disaster recovery as a cloud service: Economic benefits & deployment challenges","volume":"10","author":"wood","year":"2010","journal-title":"HotCloud"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883908"},{"journal-title":"The NIST Definition of Cloud Computing","year":"2011","author":"mell","key":"ref1"},{"key":"ref20","first-page":"84","article-title":"A cp intrusion detection strategy on cloud computing","author":"guan","year":"2009","journal-title":"International Symposium on Web Information Systems and Applications (WISA)"},{"key":"ref22","first-page":"552","article-title":"Multi-level intrusion detection system and log management in cloud computing","author":"lee","year":"2011","journal-title":"Advanced Communication Technology (ICACT) 2011 13th International Conference on"},{"key":"ref21","first-page":"191","article-title":"A virtual machine introspection based architecture for intrusion detection","volume":"3","author":"garfinkel","year":"2003","journal-title":"NDSS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"ref26","article-title":"Dapa: diagnosing application performance anomalies for virtualized infrastructures","author":"kang","year":"2012","journal-title":"Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet Cloud and Enterprise Networks and Services"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.65"}],"event":{"name":"2016 IEEE 9th International Conference on Cloud Computing (CLOUD)","start":{"date-parts":[[2016,6,27]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2016,7,2]]}},"container-title":["2016 IEEE 9th International Conference on Cloud Computing (CLOUD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819578\/7820017\/07820324.pdf?arnumber=7820324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T01:32:48Z","timestamp":1506994368000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7820324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cloud.2016.0087","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}