1. Bhushan, K. and Gupta, B.B.Hypothesis test for low-rate DDoS attack detection in cloud computing environment. Procedia computer science, vol. 132, pp. 947-955, 2018. 2. Khan M.A.A survey of security issues for cloud computing. Journal of network and computer applications, vol. 71, pp. 11-29, 2016. 3. Modi C.N., Patel D.R., Patel A. and Rajarajan M.Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. Procedia Technology, vol. 6, pp. 905-912, 2012. 4. Idhammad, M., Afdel, K. and Belouch, M.Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science, vol. 127, pp.35-41, 2018. 5. Abusitta A., Bellaiche M., Dagenais M. and Halabi T.A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, vol. 98, pp. 308-318, 2019. 6. Samriya, J.K. and Kumar, N.A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing.Materials Today: Proceedings, 2020. 7. Zhang Z., Wen J., Zhang J., Cai X. and Xie L.A many objective-based feature selection model for anomaly detection in cloud environment. IEEE Access, vol. 8, pp.60218-60231, 2020. 8. Rabbani M., Wang Y.L., Khoshkangini R., Jelodar H., Zhao R. and Hu P.A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, vol. 151, pp. 102507, 2020. 9. Krishnaveni S., Sivamohan S., Sridhar S.S. and Prabakaran S.Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, vol. 24, no. 3, pp. 1761-1779, 2021. 10. Thilagam, T. and Aruna, R.Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express, vol. 7, no. 4, pp. 512-520, 2021. 11. Binbusayyis, A. and Vaiyapuri, T.Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Applied Intelligence, vol. 51, no. 10, pp. 7094-7108, 2021. 12. Mayuranathan M., Saravanan S.K., Muthusenthil B. and Samydurai A.An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique. Advances in Engineering Software, vol. 173, pp. 103236, 2022. 13. Ibrahim, N.M. and Zainal, A.A distributed intrusion detection scheme for cloud computing. International Journal of Distributed Systems and Technologies (IJDST), vol. 11, no. 1, pp. 68-82, 2020. 14. Blackwell, T.M., Kennedy, J. and Poli, R.Particle swarm optimization. Swarm Intelligence, vol. 1, no. 1, pp. 33-57, 2007. 15. Jambak, M.I. and Jambak, A.I.I. Comparison of dimensional reduction using the Singular Value Decomposition Algorithm and the Self Organizing Map Algorithm in clustering result of text documents. In IOP Conference Series: Materials Science and Engineering, IOP Publishing, vol. 551, no. 1, pp. 012046 2019. 16. Samriya J.K., Tiwari R., Cheng X., Singh R.K., Shankar A. and Kumar M.Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework. Sustainable Computing: Informatics and Systems, vol. 35, pp. 100746, 2022. 17. Saranya T., Sridevi S., Deisy C., Chung T.D. and Khan M.A.Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Computer Science, vol. 171, pp. 1251-1260, 2020. |