{"id":"https://openalex.org/W2916871439","doi":"https://doi.org/10.1109/glocom.2018.8647499","title":"Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks","display_name":"Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2916871439","doi":"https://doi.org/10.1109/glocom.2018.8647499","mag":"2916871439"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8647499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078523903","display_name":"Xuanyu Liu","orcid":"https://orcid.org/0000-0001-8916-9942"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuanyu Liu","raw_affiliation_strings":["State Key Laboratory for Novel, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103805225","display_name":"Xiao Fu","orcid":"https://orcid.org/0009-0006-6601-5290"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Fu","raw_affiliation_strings":["State Key Laboratory for Novel, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073104000","display_name":"Bin Luo","orcid":"https://orcid.org/0000-0002-9036-0063"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Luo","raw_affiliation_strings":["State Key Laboratory for Novel, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Dept. of Computer and Information Sciences, Temple University, Philadelphia, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Sciences, Temple University, Philadelphia, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, University of Idaho, Idaho, Moscow, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, University of Idaho, Idaho, Moscow, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078523903"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69719978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8341894745826721},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7712113857269287},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6520218253135681},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6288702487945557},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5881999731063843},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4914325475692749},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4283735156059265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4198927879333496},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4108015298843384},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3638327121734619},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31619954109191895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1115034818649292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341894745826721},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7712113857269287},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6520218253135681},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6288702487945557},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4914325475692749},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4283735156059265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4198927879333496},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4108015298843384},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3638327121734619},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31619954109191895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1115034818649292},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2018.8647499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1982626035","https://openalex.org/W2017802026","https://openalex.org/W2021079631","https://openalex.org/W2080765376","https://openalex.org/W2083570493","https://openalex.org/W2107881300","https://openalex.org/W2114337635","https://openalex.org/W2167804035","https://openalex.org/W2170018742","https://openalex.org/W2460736843","https://openalex.org/W2517389839","https://openalex.org/W2528183044","https://openalex.org/W2533895917","https://openalex.org/W2535399211","https://openalex.org/W4235032983"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W4223488648","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727"],"abstract_inverted_index":{"The":[0],"cognitive":[1,119,156],"network":[2],"system":[3,184],"learns":[4],"from":[5],"the":[6,18,21,35,48,67,155],"past":[7],"(situations,":[8],"plans,":[9],"decisions,":[10],"actions)":[11],"and":[12,40,51,70,81,108,182,194,200],"uses":[13],"this":[14,99],"knowledge":[15],"to":[16,47,60,158,169,197],"improve":[17],"decisions":[19,160],"in":[20,24,34,118,161,191],"future.":[22],"Scenarios":[23],"which":[25],"data":[26,69,71,133],"resources":[27],"for":[28,37,66,111],"configuring":[29],"radio-system":[30],"parameters":[31],"are":[32,44,77,91],"stored":[33],"cloud":[36,68],"easily":[38],"sharing":[39],"exchanging":[41],"between":[42],"nodes":[43],"foreseeable.":[45],"Due":[46],"physical":[49],"inaccessibility":[50],"limited":[52],"control,":[53],"it":[54,128,144,148,164],"is":[55,139,195],"always":[56,79],"a":[57,94,103,174],"tough":[58],"topic":[59],"formulate":[61],"appropriate":[62],"access":[63,72,105,134],"control":[64,106],"strategies":[65],"requests":[73,90],"submitted":[74,136],"by":[75,137],"applications":[76,117,138,181],"not":[78],"correct":[80],"credible.":[82],"Cloud":[83],"servers":[84],"cannot":[85],"clearly":[86],"confirm":[87],"that":[88,131,143],"these":[89],"consistent":[92],"with":[93,180],"user's":[95],"original":[96],"intent.":[97],"In":[98],"paper,":[100],"we":[101],"propose":[102],"new":[104],"method":[107],"forensic":[109,171],"framework":[110,122,187],"user-intent":[112,151],"monitoring":[113],"of":[114,177],"cloud-based":[115],"networked":[116],"networks.":[120],"Our":[121,186],"has":[123],"two":[124],"main":[125],"functions.":[126],"Firstly,":[127],"makes":[129],"sure":[130],"every":[132],"request":[135],"correct.":[140],"This":[141],"means":[142],"accurately":[145],"shows":[146],"what":[147],"wants.":[149],"Monitoring":[150],"can":[152,165,188],"also":[153],"help":[154,170],"engine":[157],"make":[159],"turn.":[162],"Secondly,":[163],"offer":[166],"adequate":[167],"details":[168],"analysts":[172],"reconstruct":[173],"precise":[175],"view":[176],"user":[178],"interaction":[179],"understand":[183],"conditions.":[185],"function":[189],"correctly":[190],"untrusted":[192],"environments":[193],"transparent":[196],"applications,":[198],"systems":[199],"communication":[201],"environments.":[202],"It":[203],"incurs":[204],"no":[205],"discernible":[206],"performance":[207],"overhead.":[208]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
