{"id":"https://openalex.org/W2514247279","doi":"https://doi.org/10.1145/2905055.2905175","title":"Intrusion Detection System Using Genetic Algorithm for Cloud","display_name":"Intrusion Detection System Using Genetic Algorithm for Cloud","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2514247279","doi":"https://doi.org/10.1145/2905055.2905175","mag":"2514247279"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036859741","display_name":"Tanya Singh","orcid":"https://orcid.org/0000-0001-6080-472X"},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Tanya Singh","raw_affiliation_strings":["Amity University of Information Technology, Amity University, Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"Amity University of Information Technology, Amity University, Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069725925","display_name":"Seema Verma","orcid":"https://orcid.org/0000-0001-6299-2576"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Seema Verma","raw_affiliation_strings":["Department of Electronics, Banasthali University, Rajasthan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics, Banasthali University, Rajasthan","institution_ids":["https://openalex.org/I102117144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041174390","display_name":"Vartika Kulshrestha","orcid":"https://orcid.org/0000-0002-9214-206X"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vartika Kulshrestha","raw_affiliation_strings":["Department of Electronics, Banasthali University, Rajasthan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics, Banasthali University, Rajasthan","institution_ids":["https://openalex.org/I102117144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064749022","display_name":"Sumeet Katiyar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Sumeet Katiyar","raw_affiliation_strings":["Amity University of Information Technology, Amity University Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"Amity University of Information Technology, Amity University Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036859741"],"corresponding_institution_ids":["https://openalex.org/I4210126505"],"apc_list":null,"apc_paid":null,"fwci":1.2613,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.7886026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8373978137969971},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8062922954559326},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6785649061203003},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.6594623327255249},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.6296220421791077},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5272558927536011},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5267761945724487},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47732076048851013},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4745774269104004},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44528713822364807},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42812013626098633},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41217127442359924},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.36242517828941345},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35485368967056274},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.31403452157974243},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30074018239974976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17083102464675903},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16578558087348938},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09336930513381958}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8373978137969971},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8062922954559326},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6785649061203003},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.6594623327255249},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.6296220421791077},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5272558927536011},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5267761945724487},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47732076048851013},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4745774269104004},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44528713822364807},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42812013626098633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41217127442359924},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36242517828941345},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35485368967056274},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31403452157974243},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30074018239974976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17083102464675903},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16578558087348938},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09336930513381958},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1497256448","https://openalex.org/W1982147649","https://openalex.org/W1987999418","https://openalex.org/W2015401767","https://openalex.org/W2030004564","https://openalex.org/W2049650913","https://openalex.org/W2091140700","https://openalex.org/W2103283316","https://openalex.org/W2103601587","https://openalex.org/W2104247747","https://openalex.org/W2105192523","https://openalex.org/W2133171270","https://openalex.org/W2134847701","https://openalex.org/W2138644270","https://openalex.org/W2145492393","https://openalex.org/W2186711224","https://openalex.org/W2313272351","https://openalex.org/W2331979113","https://openalex.org/W2332333821","https://openalex.org/W2676908816","https://openalex.org/W3151304249","https://openalex.org/W4244508735","https://openalex.org/W4285719527","https://openalex.org/W4289920170","https://openalex.org/W4291981231","https://openalex.org/W6675501559"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W1997222214","https://openalex.org/W2070395303"],"abstract_inverted_index":{"Cloud":[0],"and":[1,19],"its":[2],"transactions":[3],"have":[4],"emerged":[5],"as":[6,46],"a":[7,111],"major":[8],"challenge.":[9],"This":[10,30],"paper":[11,55],"aims":[12],"to":[13,23,77,101],"come":[14],"up":[15],"with":[16,34],"an":[17,57],"efficient":[18],"best":[20],"possible":[21],"way":[22],"transfer":[24],"data":[25,74,89,120],"in":[26,81,94,116],"cloud":[27,82],"computing":[28,83],"environment.":[29,84],"goal":[31],"is":[32,109],"achieved":[33],"the":[35,42,54,69,73,106],"help":[36],"of":[37,60,68],"Soft":[38],"Computing":[39],"Techniques.":[40],"Of":[41],"various":[43],"techniques":[44],"such":[45,117],"fuzzy":[47],"logic,":[48],"genetic":[49,64],"algorithm":[50],"or":[51],"neural":[52],"network,":[53],"proposes":[56],"effective":[58,79],"method":[59,80],"intrusion":[61,93],"detection":[62],"using":[63],"algorithm.":[65],"The":[66],"selection":[67],"optimized":[70],"path":[71,86],"for":[72,104,114],"transmission":[75,90,121],"proved":[76],"be":[78],"Network":[85],"optimization":[87],"increases":[88],"speed":[91,119],"making":[92],"network":[95,107],"nearly":[96],"impossible.":[97],"Intruders":[98],"are":[99],"forced":[100],"act":[102],"quickly":[103],"intruding":[105],"which":[108],"quite":[110],"tough":[112],"task":[113],"them":[115],"high":[118],"network.":[122]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
