{"id":"https://openalex.org/W7141585308","doi":"https://doi.org/10.1109/icce67443.2026.11449689","title":"Recurrent Neural Network (RNN) Based Model for Enhanced Cyberattack Detection in Cloud Forensics","display_name":"Recurrent Neural Network (RNN) Based Model for Enhanced Cyberattack Detection in Cloud Forensics","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7141585308","doi":"https://doi.org/10.1109/icce67443.2026.11449689"},"language":null,"primary_location":{"id":"doi:10.1109/icce67443.2026.11449689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130816404","display_name":"Liang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088329","display_name":"Jiading District Central Hospital","ror":"https://ror.org/004j26v17","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210088329"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["Shanghai University of Medicine and Health Sciences,Jiading District Central Hospital,Shanghai,China,201318"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Medicine and Health Sciences,Jiading District Central Hospital,Shanghai,China,201318","institution_ids":["https://openalex.org/I4210088329"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107583797","display_name":"Kwok Tai Chui","orcid":null},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kwok Tai Chui","raw_affiliation_strings":["Asia University,Department of CSIE,Taichung,Taiwan,413"],"affiliations":[{"raw_affiliation_string":"Asia University,Department of CSIE,Taichung,Taiwan,413","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130755132","display_name":"Akshat Gaurav","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akshat Gaurav","raw_affiliation_strings":["Hong Kong Metropolitan University,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University,Hong Kong SAR,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130796744","display_name":"Brij B. Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":["Hong Kong Metropolitan University,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University,Hong Kong SAR,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130757126","display_name":"Varsha Arya","orcid":null},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Varsha Arya","raw_affiliation_strings":["Asia University,Department of CSIE,Taichung,Taiwan,413"],"affiliations":[{"raw_affiliation_string":"Asia University,Department of CSIE,Taichung,Taiwan,413","institution_ids":["https://openalex.org/I143578492"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5130816404"],"corresponding_institution_ids":["https://openalex.org/I4210088329"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.9334845,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7883999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7883999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.056299999356269836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.016499999910593033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5388000011444092},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5203999876976013},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.37779998779296875},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.33079999685287476},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.26260000467300415}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6535999774932861},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5388000011444092},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5203999876976013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4000000059604645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3808000087738037},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3296000063419342},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.2558000087738037},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce67443.2026.11449689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.45980697870254517}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2800773710","https://openalex.org/W2947730823","https://openalex.org/W2960278926","https://openalex.org/W2979928150","https://openalex.org/W3039482309","https://openalex.org/W3042975239","https://openalex.org/W3155559132","https://openalex.org/W4213225620","https://openalex.org/W4213423307","https://openalex.org/W4226047544","https://openalex.org/W4283271042","https://openalex.org/W4283709823","https://openalex.org/W4285110266","https://openalex.org/W4286681622","https://openalex.org/W4295308321","https://openalex.org/W4312273550","https://openalex.org/W4312942686","https://openalex.org/W4313326425","https://openalex.org/W4324031745","https://openalex.org/W4367165034","https://openalex.org/W4392114370"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"a":[5,89],"Recurrent":[6],"Neural":[7],"Network":[8],"(RNN)-based":[9],"model":[10,24,35,49,53,63,71,87],"designed":[11],"to":[12,43],"improve":[13],"the":[14,26,37,45,55,73,78,93],"detection":[15],"of":[16,28,57,67,75,80,97],"cyberattacks":[17],"within":[18],"cloud":[19,101],"forensic":[20],"investigations.":[21],"The":[22,34,47,61,69,85],"presented":[23],"addressed":[25],"challenge":[27],"class":[29],"imbalance":[30],"in":[31,77,100],"cyberattack":[32],"datasets.":[33],"employed":[36],"Synthetic":[38],"Minority":[39],"Over-sampling":[40],"Technique":[41],"(SMOTE)":[42],"balance":[44],"dataset.":[46],"proposed":[48,62,70,86],"used":[50],"random":[51],"forest":[52],"for":[54,92],"selection":[56],"optimal":[58],"feature":[59],"set.":[60],"gives":[64],"an":[65],"accuracy":[66],"0.99.":[68],"showcases":[72],"potential":[74],"RNNs":[76],"area":[79],"digital":[81],"forensics":[82],"and":[83,95],"cybersecurity.":[84],"provides":[88],"reliable":[90],"tool":[91],"identification":[94],"classification":[96],"malicious":[98],"activities":[99],"environments.":[102]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
