A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique

M Mayuranathan, SK Saravanan, B Muthusenthil… - … in Engineering Software, 2022 - Elsevier
Users have been urged to embrace a cloud-based environment by recent technologies and
advancements. Because of the dispersed nature of cloud solutions, security is a major …

Biometric authentication-based intrusion detection using artificial intelligence internet of things in smart city

C Annadurai, I Nelson, KN Devi, R Manikandan… - Energies, 2022 - mdpi.com
Nowadays, there is a growing demand for information security and security rules all across
the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

J Chen, D Wu, R **e - Frontiers of Information Technology & Electronic …, 2023 - Springer
Three technical problems should be solved urgently in cyberspace security: the timeliness
and accuracy of network attack detection, the credibility assessment and prediction of the …

The sound of intrusion: A novel network intrusion detection system

MY Aldarwbi, AH Lashkari, AA Ghorbani - Computers and Electrical …, 2022 - Elsevier
A network intrusion detection system is an essential part of network security research. It
detects intrusion behaviors through active defense technology and takes emergency …

Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization …

G Senthilkumar, K Tamilarasi, JK Periasamy - Wireless Networks, 2024 - Springer
The cloud computing environment has been severely harmed by security issues, which has
a negative impact on the healthy and sustainable development of the cloud. Intrusion …

HIDM: A hybrid intrusion detection model for cloud based systems

LK Vashishtha, AP Singh, K Chatterjee - Wireless Personal …, 2023 - Springer
The cloud computing model is very popular among the users in different sectors like
banking, healthcare, education etc due to its customized low-cost services with high level …

A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model

B Gopalakrishnan, P Purusothaman - Peer-to-Peer Networking and …, 2022 - Springer
Abstract Internet of Things (IoT) is a significant area in the digital era for the purpose of data
collection and transferring them on the network without the help of a human, which shows …

Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments

M Aljebreen, MA Alohali, H Mahgoub, SS Aljameel… - Sensors, 2023 - mdpi.com
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …