Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments

M Aljebreen, MA Alohali, H Mahgoub, SS Aljameel… - Sensors, 2023 - mdpi.com
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …

Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection

L Yuan, X Tian, J Yuan, J zhang, X Dai, AA Heidari… - Cluster …, 2024 - Springer
Intrusion detection system (IDS) classify network traffic as either threatening or normal based
on data features, aiming to identify malicious activities attempting to compromise computer …

A Comprehensive Survey: Exploring Current Trends and Challenges in Intrusion Detection and Prevention Systems in the Cloud Computing Paradigm

K Prabu, P Sudhakar - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
The rapid evolution of internet technologies has led to a significant proliferation of connected
devices, expanding the potential attack surface. This necessitates the implementation of …

Performance Evaluation of Genetic Algorithm-Driven Blockchain Encryption for EHR Management and Validation

A Srivastava, S Ahmad - Journal of Electrical Systems, 2024 - search.proquest.com
In the realm of electronic health record (EHR) management, ensuring robust security and
validation mechanisms is paramount due to the sensitive nature of healthcare data. This …

CloudFusion: Multi-Source Intrusion Detection in Cloud Environments

X Yang, Z Kun, XH Jun, T Bibo… - 2024 27th International …, 2024 - ieeexplore.ieee.org
Addressing the multifaceted security challenges inherent in cloud environments, our study
delineates a robust, real-time threat detection framework. This methodology integrates three …