{"id":"https://openalex.org/W2777851160","doi":"https://doi.org/10.1109/wcnc.2018.8376973","title":"Cyberattack detection in mobile cloud computing: A deep learning approach","display_name":"Cyberattack detection in mobile cloud computing: A deep learning approach","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2777851160","doi":"https://doi.org/10.1109/wcnc.2018.8376973","mag":"2777851160"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2018.8376973","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8376973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1712.05914","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057045100","display_name":"Khoi Khac Nguyen","orcid":"https://orcid.org/0000-0001-5572-4354"},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Khoi Khac Nguyen","raw_affiliation_strings":["School of Information and Communication Technology, Hanoi University of Science and Technology, Vietnam","School of Information and Communication Technology, Hanoi University of Science and Technology,Vietnam"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Technology, Hanoi University of Science and Technology, Vietnam","institution_ids":["https://openalex.org/I94518387"]},{"raw_affiliation_string":"School of Information and Communication Technology, Hanoi University of Science and Technology,Vietnam","institution_ids":["https://openalex.org/I94518387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992576","display_name":"Dinh Thai Hoang","orcid":"https://orcid.org/0000-0002-9528-0863"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore","School of Computer Science and Engineering Nanyang Technological University,Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Computer Science and Engineering Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore","School of Computer Science and Engineering Nanyang Technological University,Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Computer Science and Engineering Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100338694","display_name":"Ping Wang","orcid":"https://orcid.org/0000-0002-9485-7325"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ping Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore","School of Computer Science and Engineering Nanyang Technological University,Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Computer Science and Engineering Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697893","display_name":"Diep N. Nguyen","orcid":"https://orcid.org/0000-0003-2659-8648"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep Nguyen","raw_affiliation_strings":["School of Computing and Communications, University of Technology Sydney, Australia","School of Computing and Communications, University of Technology, Sydney, , Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Computing and Communications, University of Technology, Sydney, , Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063537942","display_name":"Eryk Dutkiewicz","orcid":"https://orcid.org/0000-0002-4268-9286"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eryk Dutkiewicz","raw_affiliation_strings":["School of Computing and Communications, University of Technology Sydney, Australia","School of Computing and Communications, University of Technology, Sydney, , Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Computing and Communications, University of Technology, Sydney, , Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5057045100"],"corresponding_institution_ids":["https://openalex.org/I94518387"],"apc_list":null,"apc_paid":null,"fwci":0.7802,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74577645,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.9105380773544312},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.7943850755691528},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7773834466934204},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6005697846412659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5325295925140381},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.5206953287124634},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4878268539905548},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48566901683807373},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.41169238090515137},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3094007968902588},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17393195629119873},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11520916223526001}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9105380773544312},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.7943850755691528},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7773834466934204},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6005697846412659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5325295925140381},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.5206953287124634},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4878268539905548},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48566901683807373},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.41169238090515137},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3094007968902588},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17393195629119873},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11520916223526001},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/wcnc.2018.8376973","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8376973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1712.05914","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1712.05914","pdf_url":"https://arxiv.org/pdf/1712.05914","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2777851160","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1712.05914","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/131928","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/131928","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"doi:10.48550/arxiv.1712.05914","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1712.05914","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1712.05914","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1712.05914","pdf_url":"https://arxiv.org/pdf/1712.05914","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2777851160.pdf","grobid_xml":"https://content.openalex.org/works/W2777851160.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W44815768","https://openalex.org/W1555148682","https://openalex.org/W2024174643","https://openalex.org/W2025134013","https://openalex.org/W2099940443","https://openalex.org/W2100495367","https://openalex.org/W2104237724","https://openalex.org/W2116064496","https://openalex.org/W2136922672","https://openalex.org/W2167976067","https://openalex.org/W2217442075","https://openalex.org/W2518820464","https://openalex.org/W2565526159","https://openalex.org/W2581826568","https://openalex.org/W2594223590","https://openalex.org/W2601678266","https://openalex.org/W2605076645","https://openalex.org/W2734235029","https://openalex.org/W2796585648","https://openalex.org/W2919115771","https://openalex.org/W4241584346","https://openalex.org/W6601785968","https://openalex.org/W6676481782","https://openalex.org/W6734853030"],"related_works":["https://openalex.org/W2052122539","https://openalex.org/W1982354667","https://openalex.org/W3196419531","https://openalex.org/W2816623457","https://openalex.org/W2945094362","https://openalex.org/W3046415650","https://openalex.org/W2325540268","https://openalex.org/W2059492821","https://openalex.org/W3180751607","https://openalex.org/W1509144438","https://openalex.org/W2537386963","https://openalex.org/W124655359","https://openalex.org/W2083563943","https://openalex.org/W2148850383","https://openalex.org/W2493666673","https://openalex.org/W80949692","https://openalex.org/W2937740192","https://openalex.org/W3167410013","https://openalex.org/W2073302275","https://openalex.org/W2758261577"],"abstract_inverted_index":{"With":[0],"the":[1,59,110,115,124],"rapid":[2],"growth":[3],"of":[4,126],"mobile":[5,10,23,60,82],"applications":[6,25],"and":[7,20,36,48],"cloud":[8,11,24,61,83],"computing,":[9],"computing":[12,62],"has":[13],"attracted":[14],"great":[15],"interest":[16],"from":[17],"both":[18],"academia":[19],"industry.":[21],"However,":[22],"are":[26],"facing":[27],"security":[28],"issues":[29],"such":[30,43],"as":[31],"data":[32],"integrity,":[33],"users'":[34],"confidentiality,":[35],"service":[37],"availability.":[38],"A":[39],"preventive":[40],"approach":[41,77],"to":[42,46,58,78,106,122],"problems":[44],"is":[45],"detect":[47,79],"isolate":[49],"cyber":[50],"threats":[51],"before":[52],"they":[53],"can":[54],"cause":[55],"serious":[56],"impacts":[57],"system.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67,88,113],"propose":[68],"a":[69,74,102],"novel":[70],"framework":[71,93],"that":[72,90],"leverages":[73],"deep":[75],"learning":[76],"cyberattacks":[80],"in":[81,108],"environment.":[84],"Through":[85],"experimental":[86],"results,":[87],"show":[89],"our":[91,127],"proposed":[92,128],"not":[94],"only":[95],"recognizes":[96],"diverse":[97],"cyberattacks,":[98],"but":[99],"also":[100],"achieves":[101],"high":[103],"accuracy":[104],"(up":[105],"97.11%)":[107],"detecting":[109],"attacks.":[111],"Furthermore,":[112],"present":[114],"comparisons":[116],"with":[117],"current":[118],"machine":[119],"learning-based":[120],"approaches":[121],"demonstrate":[123],"effectiveness":[125],"solution.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
