Securing Cloud Using Intrusion Detection Systems: A Review Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.3233/atde221315
Cloud computing consists of technologies like distributed computing, grid computing, virtualization, utility computing, network computing, and the web. There are several threats in the cloud, such as man-in-the-middle attacks, port scans, DoS/DDoS attacks, IP spoofing, and phishing. One of the most serious threats today is denial-of-service attacks, because they affect the availability of critical resources. The primary goal of this paper is to analyze the intrusion detection systems (IDSs) that can identify intrusion attempts in distributed systems as well as virtualized environments. This paper discusses various types of systems such as anomaly, signature, hybrid, hierarchical, and collaborative IDS. The systems are studied and the various methodologies, tools, datasets, operating layers, and accuracies of the IDS are compared and contrasted.
Related Topics
- Type
- review
- Language
- en
- Landing Page
- https://doi.org/10.3233/atde221315
- https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315
- OA Status
- diamond
- Cited By
- 1
- References
- 26
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4315629339
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4315629339Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3233/atde221315Digital Object Identifier
- Title
-
Securing Cloud Using Intrusion Detection Systems: A ReviewWork title
- Type
-
reviewOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-01-09Full publication date if available
- Authors
-
Vishnu Balaji Eepari, Ch. Govind Raju, P. Dileesh Sai, K Govindaraju, B.S. Kiruthika DeviList of authors in order
- Landing page
-
https://doi.org/10.3233/atde221315Publisher landing page
- PDF URL
-
https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Denial-of-service attack, Intrusion detection system, Spoofing attack, Virtualization, Grid computing, Computer security, IP address spoofing, Host-based intrusion detection system, Network security, Distributed computing, Grid, Intrusion prevention system, Operating system, The Internet, Network address translation, Geometry, Mathematics, Internet ProtocolTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
26Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4315629339 |
|---|---|
| doi | https://doi.org/10.3233/atde221315 |
| ids.doi | https://doi.org/10.3233/atde221315 |
| ids.openalex | https://openalex.org/W4315629339 |
| fwci | 1.10923837 |
| type | review |
| title | Securing Cloud Using Intrusion Detection Systems: A Review |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9987000226974487 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9925000071525574 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9853000044822693 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7777202129364014 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7668591737747192 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38822068 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7155340909957886 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Denial-of-service attack |
| concepts[3].id | https://openalex.org/C35525427 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6888679265975952 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[3].display_name | Intrusion detection system |
| concepts[4].id | https://openalex.org/C167900197 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6118289232254028 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q11081100 |
| concepts[4].display_name | Spoofing attack |
| concepts[5].id | https://openalex.org/C513985346 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5827456712722778 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q270471 |
| concepts[5].display_name | Virtualization |
| concepts[6].id | https://openalex.org/C70429105 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5208562016487122 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q249999 |
| concepts[6].display_name | Grid computing |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.496886283159256 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C111814575 |
| concepts[8].level | 5 |
| concepts[8].score | 0.4363759756088257 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q550893 |
| concepts[8].display_name | IP address spoofing |
| concepts[9].id | https://openalex.org/C90936777 |
| concepts[9].level | 4 |
| concepts[9].score | 0.4121846854686737 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q917189 |
| concepts[9].display_name | Host-based intrusion detection system |
| concepts[10].id | https://openalex.org/C182590292 |
| concepts[10].level | 2 |
| concepts[10].score | 0.41187116503715515 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[10].display_name | Network security |
| concepts[11].id | https://openalex.org/C120314980 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3824321925640106 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[11].display_name | Distributed computing |
| concepts[12].id | https://openalex.org/C187691185 |
| concepts[12].level | 2 |
| concepts[12].score | 0.35791024565696716 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q2020720 |
| concepts[12].display_name | Grid |
| concepts[13].id | https://openalex.org/C27061796 |
| concepts[13].level | 3 |
| concepts[13].score | 0.3169289231300354 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[13].display_name | Intrusion prevention system |
| concepts[14].id | https://openalex.org/C111919701 |
| concepts[14].level | 1 |
| concepts[14].score | 0.19224387407302856 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[14].display_name | Operating system |
| concepts[15].id | https://openalex.org/C110875604 |
| concepts[15].level | 2 |
| concepts[15].score | 0.17862358689308167 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[15].display_name | The Internet |
| concepts[16].id | https://openalex.org/C147873670 |
| concepts[16].level | 4 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q11182 |
| concepts[16].display_name | Network address translation |
| concepts[17].id | https://openalex.org/C2524010 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[17].display_name | Geometry |
| concepts[18].id | https://openalex.org/C33923547 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[18].display_name | Mathematics |
| concepts[19].id | https://openalex.org/C35341882 |
| concepts[19].level | 3 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q8795 |
| concepts[19].display_name | Internet Protocol |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.7777202129364014 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7668591737747192 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[2].score | 0.7155340909957886 |
| keywords[2].display_name | Denial-of-service attack |
| keywords[3].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[3].score | 0.6888679265975952 |
| keywords[3].display_name | Intrusion detection system |
| keywords[4].id | https://openalex.org/keywords/spoofing-attack |
| keywords[4].score | 0.6118289232254028 |
| keywords[4].display_name | Spoofing attack |
| keywords[5].id | https://openalex.org/keywords/virtualization |
| keywords[5].score | 0.5827456712722778 |
| keywords[5].display_name | Virtualization |
| keywords[6].id | https://openalex.org/keywords/grid-computing |
| keywords[6].score | 0.5208562016487122 |
| keywords[6].display_name | Grid computing |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.496886283159256 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/ip-address-spoofing |
| keywords[8].score | 0.4363759756088257 |
| keywords[8].display_name | IP address spoofing |
| keywords[9].id | https://openalex.org/keywords/host-based-intrusion-detection-system |
| keywords[9].score | 0.4121846854686737 |
| keywords[9].display_name | Host-based intrusion detection system |
| keywords[10].id | https://openalex.org/keywords/network-security |
| keywords[10].score | 0.41187116503715515 |
| keywords[10].display_name | Network security |
| keywords[11].id | https://openalex.org/keywords/distributed-computing |
| keywords[11].score | 0.3824321925640106 |
| keywords[11].display_name | Distributed computing |
| keywords[12].id | https://openalex.org/keywords/grid |
| keywords[12].score | 0.35791024565696716 |
| keywords[12].display_name | Grid |
| keywords[13].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[13].score | 0.3169289231300354 |
| keywords[13].display_name | Intrusion prevention system |
| keywords[14].id | https://openalex.org/keywords/operating-system |
| keywords[14].score | 0.19224387407302856 |
| keywords[14].display_name | Operating system |
| keywords[15].id | https://openalex.org/keywords/the-internet |
| keywords[15].score | 0.17862358689308167 |
| keywords[15].display_name | The Internet |
| language | en |
| locations[0].id | doi:10.3233/atde221315 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210187496 |
| locations[0].source.issn | 2352-751X, 2352-7528 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2352-751X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Advances in transdisciplinary engineering |
| locations[0].source.host_organization | https://openalex.org/P4310318577 |
| locations[0].source.host_organization_name | IOS Press |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310318577 |
| locations[0].source.host_organization_lineage_names | IOS Press |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Advances in Transdisciplinary Engineering |
| locations[0].landing_page_url | https://doi.org/10.3233/atde221315 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5039450826 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Vishnu Balaji Eepari |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210145126 |
| authorships[0].affiliations[0].raw_affiliation_string | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[0].institutions[0].id | https://openalex.org/I4210145126 |
| authorships[0].institutions[0].ror | https://ror.org/03pztks36 |
| authorships[0].institutions[0].type | company |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210145126 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Aditya Birla (India) |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Vishnu Balaji Eepari |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[1].author.id | https://openalex.org/A5002109378 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Ch. Govind Raju |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210145126 |
| authorships[1].affiliations[0].raw_affiliation_string | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[1].institutions[0].id | https://openalex.org/I4210145126 |
| authorships[1].institutions[0].ror | https://ror.org/03pztks36 |
| authorships[1].institutions[0].type | company |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210145126 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Aditya Birla (India) |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ch. Govind Raju |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[2].author.id | https://openalex.org/A5065470846 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | P. Dileesh Sai |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210145126 |
| authorships[2].affiliations[0].raw_affiliation_string | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[2].institutions[0].id | https://openalex.org/I4210145126 |
| authorships[2].institutions[0].ror | https://ror.org/03pztks36 |
| authorships[2].institutions[0].type | company |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210145126 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Aditya Birla (India) |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | P. Dileesh Sai |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Student, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[3].author.id | https://openalex.org/A5077106856 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | K Govindaraju |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210145126 |
| authorships[3].affiliations[0].raw_affiliation_string | Associate Professor, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[3].institutions[0].id | https://openalex.org/I4210145126 |
| authorships[3].institutions[0].ror | https://ror.org/03pztks36 |
| authorships[3].institutions[0].type | company |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210145126 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Aditya Birla (India) |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | K Govindaraju |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Associate Professor, Department of CSE, Aditya Engineering College (A), Surampalem, A.P, India |
| authorships[4].author.id | https://openalex.org/A5007218910 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8592-5261 |
| authorships[4].author.display_name | B.S. Kiruthika Devi |
| authorships[4].affiliations[0].raw_affiliation_string | Research Mentor, CL Educate Ltd., New Delhi, India |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | B.S. Kiruthika Devi |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Research Mentor, CL Educate Ltd., New Delhi, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Securing Cloud Using Intrusion Detection Systems: A Review |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9987000226974487 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W1978185930, https://openalex.org/W2360631891, https://openalex.org/W1976066853, https://openalex.org/W2342553505, https://openalex.org/W2051979939, https://openalex.org/W4312366226, https://openalex.org/W2089278933, https://openalex.org/W2791075267, https://openalex.org/W2000155568, https://openalex.org/W2936855109 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.3233/atde221315 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210187496 |
| best_oa_location.source.issn | 2352-751X, 2352-7528 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2352-751X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Advances in transdisciplinary engineering |
| best_oa_location.source.host_organization | https://openalex.org/P4310318577 |
| best_oa_location.source.host_organization_name | IOS Press |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310318577 |
| best_oa_location.source.host_organization_lineage_names | IOS Press |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Advances in Transdisciplinary Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.3233/atde221315 |
| primary_location.id | doi:10.3233/atde221315 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210187496 |
| primary_location.source.issn | 2352-751X, 2352-7528 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2352-751X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Advances in transdisciplinary engineering |
| primary_location.source.host_organization | https://openalex.org/P4310318577 |
| primary_location.source.host_organization_name | IOS Press |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310318577 |
| primary_location.source.host_organization_lineage_names | IOS Press |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/ATDE221315 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Advances in Transdisciplinary Engineering |
| primary_location.landing_page_url | https://doi.org/10.3233/atde221315 |
| publication_date | 2023-01-09 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W1524203405, https://openalex.org/W4247357110, https://openalex.org/W4213255817, https://openalex.org/W2965207653, https://openalex.org/W2535159308, https://openalex.org/W2576364334, https://openalex.org/W4406406874, https://openalex.org/W3095437295, https://openalex.org/W2989230867, https://openalex.org/W2898400810, https://openalex.org/W4312564978, https://openalex.org/W2579648093, https://openalex.org/W4280604235, https://openalex.org/W2952314417, https://openalex.org/W2166366748, https://openalex.org/W4281564665, https://openalex.org/W3172899172, https://openalex.org/W2776182532, https://openalex.org/W2910315044, https://openalex.org/W802844665, https://openalex.org/W1152223117, https://openalex.org/W3217249498, https://openalex.org/W3092639525, https://openalex.org/W1509144438, https://openalex.org/W3003272299, https://openalex.org/W2237316450 |
| referenced_works_count | 26 |
| abstract_inverted_index.IP | 33 |
| abstract_inverted_index.as | 26, 77, 79, 90 |
| abstract_inverted_index.in | 22, 74 |
| abstract_inverted_index.is | 44, 61 |
| abstract_inverted_index.of | 3, 38, 52, 58, 87, 112 |
| abstract_inverted_index.to | 62 |
| abstract_inverted_index.IDS | 114 |
| abstract_inverted_index.One | 37 |
| abstract_inverted_index.The | 55, 98 |
| abstract_inverted_index.and | 15, 35, 95, 102, 110, 117 |
| abstract_inverted_index.are | 19, 100, 115 |
| abstract_inverted_index.can | 70 |
| abstract_inverted_index.the | 16, 23, 39, 50, 64, 103, 113 |
| abstract_inverted_index.IDS. | 97 |
| abstract_inverted_index.This | 82 |
| abstract_inverted_index.goal | 57 |
| abstract_inverted_index.grid | 8 |
| abstract_inverted_index.like | 5 |
| abstract_inverted_index.most | 40 |
| abstract_inverted_index.port | 29 |
| abstract_inverted_index.such | 25, 89 |
| abstract_inverted_index.that | 69 |
| abstract_inverted_index.they | 48 |
| abstract_inverted_index.this | 59 |
| abstract_inverted_index.web. | 17 |
| abstract_inverted_index.well | 78 |
| abstract_inverted_index.Cloud | 0 |
| abstract_inverted_index.There | 18 |
| abstract_inverted_index.paper | 60, 83 |
| abstract_inverted_index.today | 43 |
| abstract_inverted_index.types | 86 |
| abstract_inverted_index.(IDSs) | 68 |
| abstract_inverted_index.affect | 49 |
| abstract_inverted_index.cloud, | 24 |
| abstract_inverted_index.scans, | 30 |
| abstract_inverted_index.tools, | 106 |
| abstract_inverted_index.analyze | 63 |
| abstract_inverted_index.because | 47 |
| abstract_inverted_index.hybrid, | 93 |
| abstract_inverted_index.layers, | 109 |
| abstract_inverted_index.network | 13 |
| abstract_inverted_index.primary | 56 |
| abstract_inverted_index.serious | 41 |
| abstract_inverted_index.several | 20 |
| abstract_inverted_index.studied | 101 |
| abstract_inverted_index.systems | 67, 76, 88, 99 |
| abstract_inverted_index.threats | 21, 42 |
| abstract_inverted_index.utility | 11 |
| abstract_inverted_index.various | 85, 104 |
| abstract_inverted_index.DoS/DDoS | 31 |
| abstract_inverted_index.anomaly, | 91 |
| abstract_inverted_index.attacks, | 28, 32, 46 |
| abstract_inverted_index.attempts | 73 |
| abstract_inverted_index.compared | 116 |
| abstract_inverted_index.consists | 2 |
| abstract_inverted_index.critical | 53 |
| abstract_inverted_index.identify | 71 |
| abstract_inverted_index.computing | 1 |
| abstract_inverted_index.datasets, | 107 |
| abstract_inverted_index.detection | 66 |
| abstract_inverted_index.discusses | 84 |
| abstract_inverted_index.intrusion | 65, 72 |
| abstract_inverted_index.operating | 108 |
| abstract_inverted_index.phishing. | 36 |
| abstract_inverted_index.spoofing, | 34 |
| abstract_inverted_index.accuracies | 111 |
| abstract_inverted_index.computing, | 7, 9, 12, 14 |
| abstract_inverted_index.resources. | 54 |
| abstract_inverted_index.signature, | 92 |
| abstract_inverted_index.contrasted. | 118 |
| abstract_inverted_index.distributed | 6, 75 |
| abstract_inverted_index.virtualized | 80 |
| abstract_inverted_index.availability | 51 |
| abstract_inverted_index.technologies | 4 |
| abstract_inverted_index.collaborative | 96 |
| abstract_inverted_index.environments. | 81 |
| abstract_inverted_index.hierarchical, | 94 |
| abstract_inverted_index.methodologies, | 105 |
| abstract_inverted_index.virtualization, | 10 |
| abstract_inverted_index.denial-of-service | 45 |
| abstract_inverted_index.man-in-the-middle | 27 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.71386664 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |