Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems

ZA Hussien, HA Abdulmalik, MA Hussain… - Applied Sciences, 2023 - mdpi.com
The information obtained from external sources within the cloud and the resulting
computations are not always reliable. This is attributed to the absence of tangible …

Global-local attention-based butterfly vision transformer for visualization-based malware classification

MM Belal, DM Sundaram - IEEE Access, 2023 - ieeexplore.ieee.org
In recent studies, convolutional neural networks (CNNs) are mostly used as dynamic
techniques for visualization-based malware classification and detection. Though vision …

Research trends in deep learning and machine learning for cloud computing security

YI Alzoubi, A Mishra, AE Topcu - Artificial Intelligence Review, 2024 - Springer
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …

DBCT-Net: A dual branch hybrid CNN-transformer network for remote sensing image fusion

Q Wang, X **, Q Jiang, L Wu, Y Zhang… - Expert Systems with …, 2023 - Elsevier
Remote sensing image fusion aims at fusing high spatial resolution single-band
panchromatic (PAN) image with spectrally informative multispectral (MS) image to generate …

Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues

H Mora, FA Pujol, T Ramirez‐Gordillo… - Transactions on …, 2024 - Wiley Online Library
ABSTRACT The Mobile Cloud Computing paradigm has revolutionized the concepts of
mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the …

Hybrid feature extraction and integrated deep learning for cloud-based malware detection

PS Nguyen, TN Huy, TA Tuan, PD Trung, HV Long - Computers & Security, 2025 - Elsevier
The escalating prevalence of malware necessitates a proactive and vigilant approach to its
detection and mitigation. The ramifications of a successful malware attack on cloud services …

An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework

D Ravichandran, WSL Jebarani, H Mahalingam… - Scientific Reports, 2025 - nature.com
Security in e-healthcare applications such as Telemedicine is crucial in safeguarding
patients' sensitive data during transmission. The proposed system measures the patient's …

MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer

F Wang, X Shi, F Yang, R Song, Q Li, Z Tan… - Journal of Information …, 2024 - Elsevier
The proliferation of malware has exhibited a substantial surge in both quantity and diversity,
posing significant threats to the Internet and indispensable network applications. The …

An intelligent protection framework for intrusion detection in cloud environment based on covariance matrix self-adaptation evolution strategy and multi-criteria …

MM Belal, DM Sundaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The security defenses that are not comparable to sophisticated adversary tools, let the cloud
as an open environment for attacks and intrusions. In this paper, an intelligent protection …