{"id":"https://openalex.org/W4408048798","doi":"https://doi.org/10.1109/tc.2025.3547150","title":"Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management","display_name":"Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management","publication_year":2025,"publication_date":"2025-02-28","ids":{"openalex":"https://openalex.org/W4408048798","doi":"https://doi.org/10.1109/tc.2025.3547150"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2025.3547150","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3547150","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036147038","display_name":"Shahnawaz Ahmad","orcid":"https://orcid.org/0000-0002-0805-413X"},"institutions":[{"id":"https://openalex.org/I3129773123","display_name":"Bennett University","ror":"https://ror.org/00an5hx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I3129773123"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shahnawaz Ahmad","raw_affiliation_strings":["School of Computer Science Engineering and Technology, Bennett University, Greater Noida, India","Department of Computer Science and Engineering, School of Computer Science Engineering and Technology, Bennett University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Engineering and Technology, Bennett University, Greater Noida, India","institution_ids":["https://openalex.org/I3129773123"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Computer Science Engineering and Technology, Bennett University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I3129773123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073031910","display_name":"Mohammad Arif","orcid":"https://orcid.org/0000-0002-5887-2050"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohd Arif","raw_affiliation_strings":["School of Computer Science &#x0026; Engineering, Galgotias University, Greater Noida, India","Department of Computer Science and Engineering, School of Computing Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &#x0026; Engineering, Galgotias University, Greater Noida, India","institution_ids":["https://openalex.org/I155125381"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Computing Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I155125381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012464692","display_name":"Shabana Mehfuz","orcid":"https://orcid.org/0000-0002-5451-6964"},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shabana Mehfuz","raw_affiliation_strings":["Department of Electrical Engineering, Jamia Millia Islamia, New Delhi, India","Department of Electrical Engineering, Jamia Millia Islamia, A Central University, Okhla, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Jamia Millia Islamia, New Delhi, India","institution_ids":["https://openalex.org/I59475050"]},{"raw_affiliation_string":"Department of Electrical Engineering, Jamia Millia Islamia, A Central University, Okhla, Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026860535","display_name":"Javed Ahmad","orcid":"https://orcid.org/0000-0002-7025-751X"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Javed Ahmad","raw_affiliation_strings":["Department of Computer Science and Engineering, Sharda School of Engineering and Technology, Sharda University, Greater Noida, India","Department of Computer Science and Engineering, Sharda School of Engineering and Technology, Sharda University, Greater Noida-, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sharda School of Engineering and Technology, Sharda University, Greater Noida, India","institution_ids":["https://openalex.org/I74885063"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Sharda School of Engineering and Technology, Sharda University, Greater Noida-, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061324614","display_name":"Mohd Nazim","orcid":"https://orcid.org/0000-0003-1802-6412"},"institutions":[{"id":"https://openalex.org/I4210086299","display_name":"Noida International University","ror":"https://ror.org/001amd982","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210086299"]},{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohd Nazim","raw_affiliation_strings":["Department of Computer Science and Engineering, School of Computer Science and IT, Noida Institute of Engineering and Technology, Greater Noida, India","Department of Computer Science and Engineering, Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Computer Science and IT, Noida Institute of Engineering and Technology, Greater Noida, India","institution_ids":["https://openalex.org/I154970844","https://openalex.org/I4210086299"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036147038"],"corresponding_institution_ids":["https://openalex.org/I3129773123"],"apc_list":null,"apc_paid":null,"fwci":18.3802,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.991611,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"74","issue":"6","first_page":"1978","last_page":"1989"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9569000005722046,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9569000005722046,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6947279572486877},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6748702526092529},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6671169996261597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.624976396560669},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5031799674034119},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4765620529651642},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34664690494537354},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2879887819290161}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6947279572486877},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6748702526092529},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6671169996261597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.624976396560669},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5031799674034119},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4765620529651642},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34664690494537354},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2879887819290161},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2025.3547150","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3547150","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W2892556724","https://openalex.org/W2935920497","https://openalex.org/W2949303555","https://openalex.org/W3033030226","https://openalex.org/W3108799008","https://openalex.org/W3131088496","https://openalex.org/W3217605273","https://openalex.org/W4200548246","https://openalex.org/W4206918024","https://openalex.org/W4224249813","https://openalex.org/W4226444435","https://openalex.org/W4283012435","https://openalex.org/W4283365061","https://openalex.org/W4285132302","https://openalex.org/W4293483535","https://openalex.org/W4306650020","https://openalex.org/W4306767408","https://openalex.org/W4307200651","https://openalex.org/W4309350288","https://openalex.org/W4311462070","https://openalex.org/W4312436023","https://openalex.org/W4313477864","https://openalex.org/W4319965142","https://openalex.org/W4324057463","https://openalex.org/W4324116470","https://openalex.org/W4360994195","https://openalex.org/W4362466319","https://openalex.org/W4367306583","https://openalex.org/W4367309662","https://openalex.org/W4376272434","https://openalex.org/W4376644691","https://openalex.org/W4376877000","https://openalex.org/W4380716407","https://openalex.org/W4382998722","https://openalex.org/W4384695553","https://openalex.org/W4386902872","https://openalex.org/W4390787971","https://openalex.org/W4391131975","https://openalex.org/W4391172509","https://openalex.org/W4391258395","https://openalex.org/W4394565348","https://openalex.org/W4396645601","https://openalex.org/W4402514873"],"related_works":["https://openalex.org/W2957415295","https://openalex.org/W2152563268","https://openalex.org/W2025411550","https://openalex.org/W2134686030","https://openalex.org/W4240532262","https://openalex.org/W2392390330","https://openalex.org/W2952702399","https://openalex.org/W1637929134","https://openalex.org/W4252670433","https://openalex.org/W2584827882"],"abstract_inverted_index":{"Cloud":[0],"Computing":[1],"(CC)":[2],"is":[3,66,83,103],"widely":[4],"adopted":[5],"in":[6],"sectors":[7],"like":[8],"education,":[9],"healthcare,":[10],"and":[11,17,39,59,76,93,129,148,158],"banking":[12],"due":[13],"to":[14,25,79],"its":[15,20,86],"scalability":[16],"cost-effectiveness.":[18],"However,":[19],"internet-based":[21],"nature":[22],"exposes":[23],"it":[24],"cyber":[26,178],"threats,":[27],"necessitating":[28],"advanced":[29],"security":[30,167],"frameworks.":[31],"Traditional":[32],"models":[33],"suffer":[34],"from":[35],"high":[36],"false":[37,74],"positives":[38],"limited":[40],"adaptability.":[41],"To":[42],"address":[43],"these":[44],"challenges,":[45],"VECGLSTM,":[46],"an":[47],"attack":[48],"detection":[49],"model":[50,110],"integrating":[51],"Variable":[52],"Long":[53],"Short-Term":[54],"Memory":[55],"(VLSTM),":[56],"capsule":[57],"networks,":[58],"the":[60,116,124,130],"Enhanced":[61],"Gannet":[62],"Optimization":[63,101,120],"Algorithm":[64,121],"(EGOA),":[65],"introduced.":[67],"This":[68,109,162],"hybrid":[69],"approach":[70],"enhances":[71,165],"accuracy,":[72,143],"reduces":[73],"positives,":[75],"dynamically":[77],"adapts":[78],"evolving":[80,177],"threats.":[81],"EGOA":[82],"employed":[84],"for":[85,105,135],"superior":[87],"optimization":[88],"capability,":[89],"ensuring":[90,181],"faster":[91],"convergence":[92],"resilience.":[94],"Additionally,":[95],"Chaotic":[96],"Cryptographic":[97],"Pelican":[98,117],"Tunicate":[99,118],"Swarm":[100,119],"(CCPTSO)":[102],"proposed":[104],"privacy-preserving":[106],"key":[107,183],"management.":[108,184],"combines":[111],"chaotic":[112],"cryptographic":[113],"techniques":[114],"with":[115,152],"(PTSOA),":[122],"leveraging":[123],"pelican":[125],"algorithm\u2019s":[126],"exploration":[127],"strength":[128],"tunicate":[131],"swarm\u2019s":[132],"exploitation":[133],"ability":[134],"optimal":[136],"encryption":[137,156],"security.":[138],"Performance":[139],"evaluation":[140],"demonstrates":[141],"99.675%":[142],"99.5175%":[144],"recall,":[145],"99.7075%":[146],"precision,":[147],"99.615%":[149],"F1-score,":[150],"along":[151],"reduced":[153],"training":[154],"(1.79s),":[155],"(0.986s),":[157],"decryption":[159],"(1.029s)":[160],"times.":[161],"research":[163],"significantly":[164],"CC":[166],"by":[168],"providing":[169],"a":[170],"scalable,":[171],"adaptive":[172],"framework":[173],"that":[174],"effectively":[175],"counters":[176],"threats":[179],"while":[180],"efficient":[182]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
