{"id":"https://openalex.org/W3007708671","doi":"https://doi.org/10.1109/bigdata47090.2019.9006202","title":"Security validation testing environment in the cloud","display_name":"Security validation testing environment in the cloud","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3007708671","doi":"https://doi.org/10.1109/bigdata47090.2019.9006202","mag":"3007708671"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9006202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059632522","display_name":"Cristian Bucur","orcid":null},"institutions":[{"id":"https://openalex.org/I47099075","display_name":"Hydro-Qu\u00e9bec","ror":"https://ror.org/01nhzsw25","country_code":"CA","type":"government","lineage":["https://openalex.org/I47099075"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Cristian Bucur","raw_affiliation_strings":["Hydro-Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Hydro-Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I47099075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026060522","display_name":"Eduard Babulak","orcid":"https://orcid.org/0000-0003-2450-090X"},"institutions":[{"id":"https://openalex.org/I67789559","display_name":"Liberty University","ror":"https://ror.org/00w4qrc49","country_code":"US","type":"education","lineage":["https://openalex.org/I67789559"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eduard Babulak","raw_affiliation_strings":["Professor of Computer Science, Department of Computer Science, Liberty University, VA, USA"],"affiliations":[{"raw_affiliation_string":"Professor of Computer Science, Department of Computer Science, Liberty University, VA, USA","institution_ids":["https://openalex.org/I67789559"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059632522"],"corresponding_institution_ids":["https://openalex.org/I47099075"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80302869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"4240","last_page":"4247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6905555725097656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6732673645019531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3284316658973694},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1377025842666626}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6905555725097656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6732673645019531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3284316658973694},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1377025842666626}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9006202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9006202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1508191694","https://openalex.org/W1973078473","https://openalex.org/W2127766871","https://openalex.org/W2744879410","https://openalex.org/W6630334281","https://openalex.org/W6742649322"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214"],"abstract_inverted_index":{"Researchers":[0],"are":[1],"trying":[2],"to":[3,22,65],"find":[4],"new":[5],"ways":[6],"of":[7,38,57,103,114],"finding":[8],"and":[9,111,119],"pointing":[10],"out":[11],"Cybersecurity":[12,30],"vulnerabilities":[13],"by":[14,97],"using":[15,29],"innovative":[16],"metrics.":[17],"New":[18],"theoretical":[19,59],"proposals":[20],"need":[21],"be":[23,52],"tested":[24,107],"in":[25,40,69,81],"a":[26,70,76,88,101],"real":[27,41,83],"environment,":[28,49],"tools":[31],"applications":[32],"that":[33],"can":[34,51],"validate":[35],"the":[36,55,82],"applicability":[37],"those":[39],"life.":[42],"This":[43],"paper":[44],"presents":[45],"an":[46,63],"experimental":[47],"flexible":[48],"which":[50],"used":[53],"for":[54],"validation":[56],"several":[58],"claims":[60,110],"based":[61,92],"on":[62,93],"\u201ceasy":[64],"use\u201d":[66],"architecture":[67],"implemented":[68],"cloud":[71],"environment.":[72],"The":[73],"framework":[74],"provides":[75],"much":[77,89],"shorter":[78],"time":[79],"setup":[80],"world":[84],"as":[85,87,117],"well":[86],"better":[90],"understanding":[91],"log":[94,120],"analysis":[95],"provided":[96,112],"MS":[98],"Azure.":[99],"As":[100],"proof":[102],"concept,":[104],"we":[105],"have":[106],"three":[108],"different":[109],"proves":[113],"results":[115],"such":[116],"screenshots":[118],"samples.":[121]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
