Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment

DK Jain, W Ding, K Kotecha - International Journal of Machine Learning …, 2023 - Springer
Cloud computing (CC) has become one of the prominent technologies because of the
significant utility services, which focus on outsourcing data to companies and individual …

Secure attack detection framework for hierarchical 6G-enabled internet of vehicles

H Sedjelmaci, N Kaaniche… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Sixth Generation Heterogeneous Network (6G HetNet) is a global interconnected
system that serves a myriad variety of applications and services across multiple domains …

Human-in-the-loop-aided privacy-preserving scheme for smart healthcare

T Zhou, J Shen, D He, P Vijayakumar… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Nowadays, artificial intelligence (AI) has become the core technology for numerous
application fields ranging from self-driving cars to smart cities. Smart healthcare, as an …

Oblivious network intrusion detection systems

MAH Sayed, M Taha - Scientific Reports, 2023 - nature.com
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …

EVAD: encrypted vibrational anomaly detection with homomorphic encryption

A Falcetta, M Roveri - Neural Computing and Applications, 2024 - Springer
One of the main concerns of cloud-based services based on machine and deep learning
algorithms is the privacy of users' data. This is particularly relevant when companies want to …

A Privacy-Preserving Graph Neural Network for Network Intrusion Detection

X Pei, X Deng, S Tian, P Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the ever-growing attention on communication security, machine learning-based
network intrusion detection system (NIDS) is widely utilized to meet different security …

Efficient and privacy-preserving collaborative intrusion detection using additive secret sharing and differential privacy

L Mokry, P Slife, P Bishop, J Quiroz… - … Conference on Big …, 2021 - ieeexplore.ieee.org
Intrusion Detection Systems are commonly used by organizations to monitor network traffic
and detect attacks or suspicious behaviours. However, many attacks occur across …

Efficient hybrid model for intrusion detection systems

N Kaaniche, A Boudguiga… - … Conference on Security …, 2022 - hal.science
This paper proposes a new hybrid ML model that relies on both K-Means clustering and the
Variational Bayesian Gaussian Mixture model to efficiently detect unknown network attacks …

Oblivious intrusion detection system

MA Sayed, M Taha - … on Hardware Oriented Security and Trust …, 2022 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …