An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier

M Bakro, RR Kumar, A Alabrah, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The focus of cloud computing nowadays has been resha** the digital epoch, in which
clients now face serious concerns about the security and privacy of their data hosted in the …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier

M Bakro, RR Kumar, AA Alabrah, Z Ashraf, SK Bisoy… - Electronics, 2023 - mdpi.com
The application of cloud computing has increased tremendously in both public and private
organizations. However, attacks on cloud computing pose a serious threat to confidentiality …

[HTML][HTML] Develo** sustainability, resiliency, agility, and security criteria for cloud service providers' viability assessment: A comprehensive hierarchical structure

S Amoujavadi, A Nemati - Sustainable Futures, 2024 - Elsevier
Abstract Cloud Service Provider (CSP) selection based on several functional attributes, such
as transparency, price, latency, CPU performance, availability, and restorability, has taken …

Intrusion detection on AWS cloud through hybrid deep learning algorithm

B RM, JK MK - Electronics, 2023 - mdpi.com
The network security and cloud environment have been playing vital roles in today's era due
to increased network data transmission, the cloud's elasticity, pay as you go and global …

[HTML][HTML] Deep Learning-Driven Defense Strategies for Mitigating DDoS Attacks in Cloud Computing Environments

DMAA Afraji, J Lloret, L Peñalver - Cyber Security and Applications, 2025 - Elsevier
The kind of cyber threat prevalent and most dangerous to networked systems is the
Distributed Denial of Service (DDoS), especially with expanded connection of Internet of …

A user-priorities-based strategy for three-phase intelligent recommendation and negotiating agents for cloud services

R Kumar, MF Hassan, MHM Adnan, S Shukla… - IEEE …, 2023 - ieeexplore.ieee.org
As the field of information technology expands, there is a huge need for cloud service
providers (CSP). CSP's vast solutions and services support Cloud, IoT, Fog, and Edge …

Detecting Unbalanced Network Traffic Intrusions With Deep Learning

S Pavithra, KV Vikas - IEEE Access, 2024 - ieeexplore.ieee.org
The growth of cyber threats demands a robust and adaptive intrusion detection system (IDS)
capable of effectively recognizing malicious activities from network traffic. However, the …

[KNIHA][B] CSsEv: modelling QoS metrics in tree soft toward Cloud Services evaluator based on uncertainty environment

M Gharib, F Smarandache, M Mohamed - 2024 - books.google.com
Cloud computing (ClC) has become a more popular computer paradigm in the preceding
few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because …

Secured Dynamic Request Scheduling and Optimal CSP Selection for Analyzing Cloud Service Performance Using Intelligent Approaches

MA Khan, SM Khan, SK Subramaniam - IEEE Access, 2023 - ieeexplore.ieee.org
Due to its heterogeneity, cloud services providers'(CSPs) rapid expansion presents several
challenges, such as optimal service selection and privacy preservation. Multiple users using …