Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems

ZA Hussien, HA Abdulmalik, MA Hussain… - Applied Sciences, 2023 - mdpi.com
The information obtained from external sources within the cloud and the resulting
computations are not always reliable. This is attributed to the absence of tangible …

Global-local attention-based butterfly vision transformer for visualization-based malware classification

MM Belal, DM Sundaram - IEEE Access, 2023 - ieeexplore.ieee.org
In recent studies, convolutional neural networks (CNNs) are mostly used as dynamic
techniques for visualization-based malware classification and detection. Though vision …

Research trends in deep learning and machine learning for cloud computing security

YI Alzoubi, A Mishra, AE Topcu - Artificial Intelligence Review, 2024 - Springer
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …

DBCT-Net: A dual branch hybrid CNN-transformer network for remote sensing image fusion

Q Wang, X Jin, Q Jiang, L Wu, Y Zhang… - Expert Systems with …, 2023 - Elsevier
Remote sensing image fusion aims at fusing high spatial resolution single-band
panchromatic (PAN) image with spectrally informative multispectral (MS) image to generate …

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques-Recent Research Advancements

A Abdallah, A Alkaabi, G Alameri, SH Rafique… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of computing and networking, the concepts of cloud
networks have gained significant prominence. Although the cloud network offers on-demand …

MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer

F Wang, X Shi, F Yang, R Song, Q Li, Z Tan… - Journal of Information …, 2024 - Elsevier
The proliferation of malware has exhibited a substantial surge in both quantity and diversity,
posing significant threats to the Internet and indispensable network applications. The …

An intelligent protection framework for intrusion detection in cloud environment based on covariance matrix self-adaptation evolution strategy and multi-criteria …

MM Belal, DM Sundaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The security defenses that are not comparable to sophisticated adversary tools, let the cloud
as an open environment for attacks and intrusions. In this paper, an intelligent protection …

Cloud and Edge Computing Architectures: A Survey

H Nouhas, A Belangour… - 2023 IEEE 11th …, 2023 - ieeexplore.ieee.org
Cloud and Edge computing have transformed the digital landscape, each presenting distinct
architectural features. As computing paradigms rapidly evolve, it has become crucial to …

GVGB-IDS: an intrusion detection system using graphic visualization and gradient boosting for cloud monitoring

H Attou, H Hissou, A Guezzaz… - … and machine learning …, 2024 - taylorfrancis.com
Cloud computing (CC) has become increasingly vital in modern technology, offering
scalable resources and cost-efficiency. However, the shared nature of the cloud raises …