{"id":"https://openalex.org/W7083013180","doi":"https://doi.org/10.32604/cmc.2025.068566","title":"A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems","display_name":"A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7083013180","doi":"https://doi.org/10.32604/cmc.2025.068566"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068566","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068566","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068566","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Siraj Un Muneer","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Siraj Un Muneer","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Ihsan Ullah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ihsan Ullah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zeshan Iqbal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zeshan Iqbal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Rajermani Thinakaran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajermani Thinakaran","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.71651435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"4959","last_page":"4975"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6442000269889832,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6442000269889832,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.02590000070631504,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.02239999920129776,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6898999810218811},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6610999703407288},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5939000248908997},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5881999731063843},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5156999826431274},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.45570001006126404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7139000296592712},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6898999810218811},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6610999703407288},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5939000248908997},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5156999826431274},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.45570001006126404},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.45339998602867126},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.429500013589859},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4092000126838684},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3549000024795532},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33340001106262207},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.27379998564720154},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.27059999108314514},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.26739999651908875},{"id":"https://openalex.org/C2779391423","wikidata":"https://www.wikidata.org/wiki/Q17009728","display_name":"Dynamic pricing","level":2,"score":0.259799987077713}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.068566","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068566","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068566","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068566","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1961948261","https://openalex.org/W1978738170","https://openalex.org/W2047062435","https://openalex.org/W2100297710","https://openalex.org/W2119075476","https://openalex.org/W2610727779","https://openalex.org/W2775371656","https://openalex.org/W4285820401"],"related_works":[],"abstract_inverted_index":{"The":[0,81],"complexity":[1],"of":[2,39,93,105,119],"cloud":[3,34,106],"environments":[4],"challenges":[5],"secure":[6],"resource":[7,152],"management,":[8],"especially":[9],"for":[10,78,132],"intrusion":[11],"detection":[12],"systems":[13,154],"(IDS).":[14],"Existing":[15],"strategies":[16],"struggle":[17],"to":[18,32,52,126,149,161],"balance":[19],"efficiency,":[20],"cost":[21],"fairness,":[22],"and":[23,55,60,75,97,123,159],"threat":[24],"resilience.":[25],"This":[26,49],"paper":[27],"proposes":[28],"an":[29,63,85],"innovative":[30],"approach":[31,50],"managing":[33],"resources":[35,73],"through":[36],"the":[37,103,124],"integration":[38],"a":[40,45],"genetic":[41],"algorithm":[42],"(GA)":[43],"with":[44,146],"\u201cdouble":[46],"auction\u201d":[47],"method.":[48],"seeks":[51],"enhance":[53],"security":[54],"efficiency":[56],"by":[57],"aligning":[58],"buyers":[59],"sellers":[61],"within":[62],"intelligent":[64,86,151],"market":[65],"framework.":[66],"It":[67],"guarantees":[68],"equitable":[69],"pricing":[70],"while":[71],"utilizing":[72],"efficiently":[74],"optimizing":[76],"advantages":[77],"all":[79],"stakeholders.":[80],"GA":[82],"functions":[83],"as":[84,137,165],"search":[87],"mechanism":[88],"that":[89,110,155],"identifies":[90],"optimal":[91],"combinations":[92],"bids":[94],"from":[95,102],"users":[96],"suppliers,":[98],"addressing":[99],"issues":[100],"arising":[101],"intricacies":[104],"systems.":[107],"Analyses":[108],"proved":[109],"our":[111],"method":[112],"surpasses":[113],"previous":[114],"strategies,":[115],"particularly":[116],"in":[117],"terms":[118],"price":[120],"accuracy,":[121],"speed,":[122],"capacity":[125],"manage":[127],"large-scale":[128],"activities,":[129],"critical":[130],"factors":[131],"real-time":[133],"cybersecurity":[134],"systems,":[135],"such":[136,164],"IDS.":[138],"Our":[139],"research":[140],"integrates":[141],"artificial":[142],"intelligence-inspired":[143],"evolutionary":[144],"algorithms":[145],"market-driven":[147],"methods":[148],"develop":[150],"management":[153],"are":[156],"secure,":[157],"scalable,":[158],"adaptable":[160],"evolving":[162],"risks,":[163],"process":[166],"innovation.":[167]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
