Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing

G Sugitha, PB Chaluvaraj - Computers & Security, 2024 - Elsevier
The decentralized and distributed architecture of cloud computing promotes adoption and
growth in various societal domains, including education, government, information …

Cycle‐consistent generative adversarial network optimized with water strider optimization algorithm fostered intrusion detection framework for securing cloud …

BC Preethi, G Sugitha, G Kavitha - … and Computation: Practice …, 2023 - Wiley Online Library
Cloud computing is the delivery of computing services including servers, storage,
databases, networking, software, analytics, and intelligence over the internet (“the cloud”) to …

Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization …

G Senthilkumar, K Tamilarasi, JK Periasamy - Wireless Networks, 2023 - Springer
The cloud computing environment has been severely harmed by security issues, which has
a negative impact on the healthy and sustainable development of the cloud. Intrusion …

Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA

K Devi, B Muthusenthil - Transactions on Emerging …, 2022 - Wiley Online Library
Cloud computing (CC) is vulnerable for the attacks of current information technology,
because it prolongs and uses the information technology infrastructure, traditional operating …

Enhanced capsule generative adversarial network with Blockchain fostered Intrusion Detection System for Enhancing Cyber security in Cloud

RR Kanth, TP Jacob - … on Smart Technologies and Systems for …, 2023 - ieeexplore.ieee.org
Cloud computing (CC) is vulnerable to existing information technology attacks, since it
extends and utilizes information technology infrastructure, applications and typical operating …

An Optimal Modified Bidirectional Generative Adversarial Network for Security Authentication in Cloud Environment

N Subramanian - Cybernetics and Systems, 2024 - Taylor & Francis
In the contemporary world, mobile appliances are connected to a cloud environment for
balancing the wide range of data that is created. Because of the shortage of security and …

Ensuring anomaly-aware security model for dynamic cloud environment using transfer learning

G Sreelatha, AV Babu… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Cloud concepts such as resource sharing, outsourcing, and multi-tenancy create significant
challenges to the security community. Also, trusted third party and web technologies based …

Intrusion detection on AWS cloud through hybrid deep learning algorithm

B RM, JK MK - Electronics, 2023 - mdpi.com
The network security and cloud environment have been playing vital roles in today's era due
to increased network data transmission, the cloud's elasticity, pay as you go and global …

Ensembling of Attention-based Recurrent Units for Detection and Mitigation of Multiple Attacks in Cloud

M Kalaivani, G Padmavathi - International Journal of …, 2023 - search.proquest.com
In the recent years, number of threats to network security increases exponentially as the
Internet users which poses serious threat in cloud storage application. Detection and …

Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms

Z Chiba, N Abghour, K Moussaid, M Rida - computers & security, 2019 - Elsevier
The appealing features of Cloud Computing continue to fuel its adoption and its integration
in many sectors such industry, governments, education and entertainment. Nevertheless …