Enhancing Cybersecurity in Cloud Computing and WSNs: A Hybrid IDS Approach

K Sundaramoorthy, KE Purushothaman… - Computers & …, 2024 - Elsevier
The evolution of cloud computing has revolutionized how users access services, simplifying
the development and deployment of applications across various industries. With its …

[PDF][PDF] Machine Learning Based Data Access Control in Cloud Computing: A Comprehensive Review

B Omogbehin, T Sigwele, T Semong - Machine Learning, 2024 - researchgate.net
In the rapidly evolving landscape of cloud computing, securing data access has become a
paramount concern. As organizations increasingly migrate their operations to cloud …

[PDF][PDF] Scalable network intrusion detection in cloud environments through parallelized swarm-optimized neural networks

R Ramamoorthy, RK Ranganathan… - Yanbu Journal of …, 2024 - yjes.scholasticahq.com
Cloud computing (CC) offers on demand, flexible resources and services over the internet,
to secure cloud assets and resources, privacy and security remains a difficult challenge. To …

Separating prediction and explanation: anapproach based on Explainable ArtificialIntelligence for analyzing network intrusions

X Wan, G Xue, Y Zhong, Z Wang - 2024 - researchsquare.com
Intrusion detection maintains the normal activity of the network system by identifying
abnormal connections, while intrusion analysis further identifies specific types of …