{"id":"https://openalex.org/W3107384149","doi":"https://doi.org/10.1155/2020/8819958","title":"Modelling the Mimic Defence Technology for Multimedia Cloud Servers","display_name":"Modelling the Mimic Defence Technology for Multimedia Cloud Servers","publication_year":2020,"publication_date":"2020-11-27","ids":{"openalex":"https://openalex.org/W3107384149","doi":"https://doi.org/10.1155/2020/8819958","mag":"3107384149"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8819958","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8819958","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8819958.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8819958.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043548055","display_name":"Feng Feng","orcid":"https://orcid.org/0000-0002-8977-1367"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Feng","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046345742","display_name":"Xiabing Zhou","orcid":"https://orcid.org/0000-0002-6497-8118"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiabing Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, Suzhou 215006, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, Suzhou 215006, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060283626","display_name":"Bin Li","orcid":"https://orcid.org/0000-0003-3455-4901"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Li","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091337485","display_name":"Qinglei Zhou","orcid":"https://orcid.org/0000-0002-1156-1108"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglei Zhou","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046345742","https://openalex.org/A5060283626"],"corresponding_institution_ids":["https://openalex.org/I38877650","https://openalex.org/I3923682"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1618,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5604199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8790571093559265},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6653007864952087},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6490079164505005},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5840763449668884},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5142573714256287},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35644906759262085},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3256600499153137},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15885859727859497}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8790571093559265},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6653007864952087},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6490079164505005},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5840763449668884},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5142573714256287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35644906759262085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3256600499153137},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15885859727859497},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8819958","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8819958","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8819958.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a8048fb479e8404a898e82c5f16c667a","is_oa":true,"landing_page_url":"https://doaj.org/article/a8048fb479e8404a898e82c5f16c667a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8819958","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8819958","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8819958.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7279188065","display_name":null,"funder_award_id":"2016YFB0800100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8114646031","display_name":null,"funder_award_id":"2016Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3107384149.pdf","grobid_xml":"https://content.openalex.org/works/W3107384149.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W65153156","https://openalex.org/W106922399","https://openalex.org/W1512680026","https://openalex.org/W1543274545","https://openalex.org/W1587970460","https://openalex.org/W1588998206","https://openalex.org/W1972914730","https://openalex.org/W1988315607","https://openalex.org/W2003746847","https://openalex.org/W2005317356","https://openalex.org/W2025397485","https://openalex.org/W2071593615","https://openalex.org/W2083658929","https://openalex.org/W2104560855","https://openalex.org/W2114296561","https://openalex.org/W2129586531","https://openalex.org/W2145964906","https://openalex.org/W2179025976","https://openalex.org/W2296335794","https://openalex.org/W2358583960","https://openalex.org/W2494110282","https://openalex.org/W2568347445","https://openalex.org/W2590693457","https://openalex.org/W2597014995","https://openalex.org/W2597344931","https://openalex.org/W2859978004","https://openalex.org/W2991700376","https://openalex.org/W3003539869","https://openalex.org/W3005152721","https://openalex.org/W3118517595","https://openalex.org/W4232836212","https://openalex.org/W4248794113","https://openalex.org/W6753408473","https://openalex.org/W6788651489","https://openalex.org/W7001964796","https://openalex.org/W7024783317","https://openalex.org/W7054548216"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W4223488648","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W2105580438"],"abstract_inverted_index":{"A":[0],"current":[1],"research":[2],"trend":[3],"is":[4,28,37,46,66],"to":[5,41,204],"combine":[6],"multimedia":[7,25],"data":[8],"with":[9],"artificial":[10],"intelligence":[11],"and":[12,30,91,97,102,113,126,163,168,184,190,210],"process":[13,138],"them":[14],"on":[15,155],"cloud":[16,26],"servers.":[17],"In":[18,85],"this":[19,42,86],"context,":[20],"ensuring":[21],"the":[22,31,63,88,108,111,116,120,127,131,137,141,156,181,186,193,207,224,231],"security":[23,219],"of":[24,70,115,130,140,159,188,218,226],"servers":[27],"critical,":[29],"cyber":[32],"mimic":[33],"defence":[34,50,191],"(CMD)":[35],"technology":[36,51],"a":[38,67,72,98,148,215],"promising":[39],"approach":[40],"end.":[43],"CMD,":[44,71],"which":[45],"an":[47,166],"innovative":[48],"active":[49],"developed":[52],"in":[53,58,192],"China,":[54],"can":[55,220,234],"be":[56,221,235],"applied":[57],"many":[59],"scenarios.":[60],"However,":[61],"although":[62],"mathematical":[64,75,128,150,171,198],"model":[65,76,109,172,177,233],"key":[68],"component":[69],"universally":[73],"acceptable":[74],"for":[77],"theoretical":[78],"CMD":[79,132,170,182,194,208,227],"has":[80],"not":[81],"been":[82],"established":[83],"yet.":[84],"work,":[87],"attack":[89,142,189],"problems":[90,187],"modelling":[92,100,121],"difficulties":[93,122],"were":[94,104,123,144,202],"extensively":[95],"examined,":[96],"comprehensive":[99],"theory":[101],"concepts":[103],"clarified.":[105],"By":[106],"decoupling":[107],"from":[110],"input":[112],"output":[114],"specific":[117,149],"system":[118],"scene,":[119],"effectively":[124],"avoided,":[125],"expression":[129],"mechanism":[133,183],"was":[134,173,212,228],"enhanced.":[135],"Furthermore,":[136,223],"characteristics":[139],"behaviour":[143],"identified":[145],"by":[146],"using":[147],"mapping":[151],"method.":[152],"Finally,":[153],"based":[154],"decomposition":[157],"problem":[158],"large":[160],"prime":[161],"factors":[162],"convolution":[164],"operations,":[165],"intuitive":[167],"exclusive":[169],"proposed.":[174],"The":[175],"proposed":[176,232],"could":[178],"clearly":[179],"express":[180],"transform":[185],"domain":[195],"into":[196],"corresponding":[197],"problems.":[199],"These":[200],"aspects":[201],"considered":[203],"qualitatively":[205],"assess":[206],"security,":[209],"it":[211],"noted":[213],"that":[214],"high":[216],"level":[217],"realized.":[222],"overhead":[225],"analyzed.":[229],"Moreover,":[230],"directly":[236],"programmed.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
