A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique
Users have been urged to embrace a cloud-based environment by recent technologies and
advancements. Because of the dispersed nature of cloud solutions, security is a major …
advancements. Because of the dispersed nature of cloud solutions, security is a major …
Biometric authentication-based intrusion detection using artificial intelligence internet of things in smart city
Nowadays, there is a growing demand for information security and security rules all across
the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network …
the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network …
Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
J Chen, D Wu, R **e - Frontiers of Information Technology & Electronic …, 2023 - Springer
Three technical problems should be solved urgently in cyberspace security: the timeliness
and accuracy of network attack detection, the credibility assessment and prediction of the …
and accuracy of network attack detection, the credibility assessment and prediction of the …
The sound of intrusion: A novel network intrusion detection system
A network intrusion detection system is an essential part of network security research. It
detects intrusion behaviors through active defense technology and takes emergency …
detects intrusion behaviors through active defense technology and takes emergency …
Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization …
The cloud computing environment has been severely harmed by security issues, which has
a negative impact on the healthy and sustainable development of the cloud. Intrusion …
a negative impact on the healthy and sustainable development of the cloud. Intrusion …
HIDM: A hybrid intrusion detection model for cloud based systems
The cloud computing model is very popular among the users in different sectors like
banking, healthcare, education etc due to its customized low-cost services with high level …
banking, healthcare, education etc due to its customized low-cost services with high level …
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model
B Gopalakrishnan, P Purusothaman - Peer-to-Peer Networking and …, 2022 - Springer
Abstract Internet of Things (IoT) is a significant area in the digital era for the purpose of data
collection and transferring them on the network without the help of a human, which shows …
collection and transferring them on the network without the help of a human, which shows …
Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …
such as networking, databases, and servers to clients and organizations in a cost-effective …