{"id":"https://openalex.org/W4416765338","doi":"https://doi.org/10.1186/s13677-025-00797-y","title":"A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment","display_name":"A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment","publication_year":2025,"publication_date":"2025-11-27","ids":{"openalex":"https://openalex.org/W4416765338","doi":"https://doi.org/10.1186/s13677-025-00797-y"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00797-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00797-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-025-00797-y.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1186/s13677-025-00797-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027113790","display_name":"Rashmi Verma","orcid":"https://orcid.org/0000-0002-8786-0104"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rashmi Verma","raw_affiliation_strings":["Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, 304022, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, 304022, India","institution_ids":["https://openalex.org/I102117144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078179158","display_name":"Manisha Jailia","orcid":"https://orcid.org/0000-0002-4291-106X"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manisha Jailia","raw_affiliation_strings":["Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, 304022, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, 304022, India","institution_ids":["https://openalex.org/I102117144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027113790"],"corresponding_institution_ids":["https://openalex.org/I102117144"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.3852,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87701271,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.334199994802475,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.334199994802475,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.227400004863739,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.039400000125169754,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7526000142097473},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.5192999839782715},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4388999938964844},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.4196999967098236},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3691999912261963},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.35370001196861267},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.33149999380111694},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.3294999897480011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7799999713897705},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7526000142097473},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.5192999839782715},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4388999938964844},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4374000132083893},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.4196999967098236},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3691999912261963},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.33149999380111694},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3273000121116638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32659998536109924},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.325300008058548},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29109999537467957},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.28119999170303345},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2750000059604645},{"id":"https://openalex.org/C153740404","wikidata":"https://www.wikidata.org/wiki/Q671224","display_name":"Data center","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00797-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00797-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-025-00797-y.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:574825a24d434035a7f168b32875fd37","is_oa":true,"landing_page_url":"https://doaj.org/article/574825a24d434035a7f168b32875fd37","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-22 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00797-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00797-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-025-00797-y.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416765338.pdf","grobid_xml":"https://content.openalex.org/works/W4416765338.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2883554196","https://openalex.org/W2935633365","https://openalex.org/W2955260561","https://openalex.org/W2963091914","https://openalex.org/W3030709604","https://openalex.org/W3173990800","https://openalex.org/W3186788521","https://openalex.org/W4205416355","https://openalex.org/W4292411761","https://openalex.org/W4313654696","https://openalex.org/W4367182499","https://openalex.org/W4386282861","https://openalex.org/W4386960783","https://openalex.org/W4389817132","https://openalex.org/W4391807504","https://openalex.org/W4392821438","https://openalex.org/W4394573751","https://openalex.org/W4399474986","https://openalex.org/W4400076000","https://openalex.org/W4400109518","https://openalex.org/W4400910578","https://openalex.org/W4402673533","https://openalex.org/W4403137131","https://openalex.org/W4403169615","https://openalex.org/W4403332609","https://openalex.org/W4404307155","https://openalex.org/W4404743241","https://openalex.org/W4407080703","https://openalex.org/W4407215128","https://openalex.org/W4408156900","https://openalex.org/W4409242896","https://openalex.org/W4410057536","https://openalex.org/W4410226601","https://openalex.org/W4412816258","https://openalex.org/W4413404027"],"related_works":[],"abstract_inverted_index":{"Multi-cloud":[0],"strategy":[1,206],"allows":[2],"distribution":[3],"of":[4,69,130,217],"workloads":[5],"across":[6,102,144],"multiple":[7],"cloud":[8,11,38,78,146,179],"platforms.":[9],"These":[10],"platforms":[12,104,147],"that":[13,90,242],"are":[14,210,233],"served":[15],"include,":[16],"public,":[17],"private,":[18],"as":[19,21],"well":[20],"hybrid":[22],"clouds.":[23],"This":[24],"gives":[25],"organizations":[26],"more":[27],"flexibility":[28],"than":[29,248],"they\u2019d":[30],"have,":[31],"if":[32],"they":[33],"depended":[34],"on":[35,225],"a":[36,57,106,114,169,199],"single":[37],"vendor":[39,49],"and":[40,52,72,76,99,152,198,228,231],"in":[41,51,95,105,134,177,185,212],"turn,":[42],"it":[43,73,139],"helps":[44],"them":[45],"optimise":[46],"costs,":[47],"dodge":[48],"lock":[50],"reinforce":[53],"operational":[54],"resilience.":[55],"As":[56],"result,":[58],"while":[59,148],"multi-cloud":[60,88,96],"deployments":[61],"have":[62],"their":[63],"inherent":[64],"complexity,":[65],"this":[66,110],"increases":[67],"risk":[68],"attack":[70,159,196],"surface":[71],"presents":[74],"new":[75],"evolving":[77],"security":[79,83,89,93,101],"challenges.":[80],"A":[81,189],"holistic":[82],"approach":[84],"is":[85,222],"needed":[86],"for":[87,125,195,207],"addresses":[91],"diverse":[92],"vulnerabilities":[94],"enterprise":[97],"world":[98],"enforces":[100],"heterogeneous":[103],"consistent":[107],"way.":[108],"In":[109],"work":[111],"we":[112],"present":[113],"Hybrid":[115],"Metaheuristic":[116],"Federated":[117,131],"Learning":[118,132],"Approach":[119],"Based":[120],"Attack":[121],"Detection":[122],"System":[123],"(HMFLA-ADS)":[124],"multi-Cloud":[126],"scenarios.":[127],"The":[128,154,239],"use":[129],"(FL)":[133],"the":[135,186,213,218],"HMFLA-ADS":[136,155,243],"model":[137],"makes":[138],"possible":[140],"to":[141,257],"collaborative":[142],"train":[143],"various":[145,236],"retaining":[149],"data":[150,183],"privacy":[151],"safe.":[153],"technique":[156],"achieves":[157],"better":[158,246],"detection":[160,197,254],"by":[161],"aggregating":[162],"knowledge":[163],"from":[164],"locally":[165],"trained":[166],"models":[167],"at":[168],"Cloud":[170],"Exchange":[171],"Point":[172],"(a":[173],"federated":[174],"node":[175],"deployed":[176],"each":[178],"region)":[180],"without":[181],"requiring":[182],"sharing":[184],"centralized":[187],"manner.":[188],"deep":[190],"Stacked":[191],"Sparse":[192],"Autoencoder":[193],"(SSAE)":[194],"hybride":[200],"Fish":[201],"School":[202],"Search":[203],"(FSS)":[204],"based":[205],"hyperparameter":[208],"tuning":[209],"used":[211],"study.":[214],"Experimental":[215],"validation":[216],"HMFLA":[219],"ADS":[220],"framework":[221,244],"carried":[223],"out":[224],"NSL-KDD,":[226],"CICIDS-2017":[227],"BoT-IoT":[229],"Datasets":[230],"results":[232],"measured":[234],"through":[235],"evaluation":[237],"metrics.":[238],"findings":[240],"show":[241],"has":[245],"performance":[247],"existing":[249],"IDS":[250],"models,":[251],"obtaining":[252],"maximum":[253],"accuracy":[255],"up":[256],"99.52%.":[258]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-28T00:00:00"}
