{"id":"https://openalex.org/W4413379466","doi":"https://doi.org/10.3390/computers14080331","title":"Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection","display_name":"Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection","publication_year":2025,"publication_date":"2025-08-15","ids":{"openalex":"https://openalex.org/W4413379466","doi":"https://doi.org/10.3390/computers14080331"},"language":"en","primary_location":{"id":"doi:10.3390/computers14080331","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14080331","pdf_url":"https://www.mdpi.com/2073-431X/14/8/331/pdf?version=1755740134","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/14/8/331/pdf?version=1755740134","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107099379","display_name":"Steven Jabulani Nhlapo","orcid":null},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Steven Jabulani Nhlapo","raw_affiliation_strings":["Department of Informatics, University of Pretoria, Pretoria 0028, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Pretoria, Pretoria 0028, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119370719","display_name":"Elodie Ngoie Mutombo","orcid":null},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Elodie Ngoie Mutombo","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria 0028, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria 0028, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046256790","display_name":"Mike Nkongolo","orcid":"https://orcid.org/0000-0003-0938-113X"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Mike Nkongolo Wa Nkongolo","raw_affiliation_strings":["Department of Informatics, University of Pretoria, Pretoria 0028, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Pretoria, Pretoria 0028, South Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046256790"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.4253,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9092925,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"14","issue":"8","first_page":"331","last_page":"331"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7708324193954468},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.7095960378646851},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5657809972763062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5211967825889587},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4709430932998657},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4190801978111267},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.38247206807136536},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.2443966567516327},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18151912093162537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10645726323127747}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7708324193954468},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.7095960378646851},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5657809972763062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5211967825889587},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4709430932998657},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4190801978111267},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.38247206807136536},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.2443966567516327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18151912093162537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10645726323127747},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14080331","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14080331","pdf_url":"https://www.mdpi.com/2073-431X/14/8/331/pdf?version=1755740134","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3843670e1bd94897a0aa760f66ec7f87","is_oa":true,"landing_page_url":"https://doaj.org/article/3843670e1bd94897a0aa760f66ec7f87","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 8, p 331 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14080331","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14080331","pdf_url":"https://www.mdpi.com/2073-431X/14/8/331/pdf?version=1755740134","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3849712237","display_name":null,"funder_award_id":"A1H895","funder_id":"https://openalex.org/F4320335315","funder_display_name":"Genomics Research Institute, University of Pretoria"}],"funders":[{"id":"https://openalex.org/F4320320692","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84"},{"id":"https://openalex.org/F4320335315","display_name":"Genomics Research Institute, University of Pretoria","ror":"https://ror.org/00g0p6g84"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413379466.pdf","grobid_xml":"https://content.openalex.org/works/W4413379466.grobid-xml"},"referenced_works_count":93,"referenced_works":["https://openalex.org/W3133688247","https://openalex.org/W3157634562","https://openalex.org/W4214733430","https://openalex.org/W4312204616","https://openalex.org/W4318824015","https://openalex.org/W4361800574","https://openalex.org/W4380551353","https://openalex.org/W4385964285","https://openalex.org/W4387859458","https://openalex.org/W4387951153","https://openalex.org/W4388451370","https://openalex.org/W4389215142","https://openalex.org/W4392729593","https://openalex.org/W4393028950","https://openalex.org/W4396580238","https://openalex.org/W4399274242","https://openalex.org/W4399325501","https://openalex.org/W4399834879","https://openalex.org/W4400877832","https://openalex.org/W4400983346","https://openalex.org/W4401370259","https://openalex.org/W4401879163","https://openalex.org/W4401905905","https://openalex.org/W4402403884","https://openalex.org/W4402444628","https://openalex.org/W4403006792","https://openalex.org/W4403690527","https://openalex.org/W4403728042","https://openalex.org/W4403777635","https://openalex.org/W4403938375","https://openalex.org/W4404035543","https://openalex.org/W4404142379","https://openalex.org/W4404556282","https://openalex.org/W4404565145","https://openalex.org/W4404726301","https://openalex.org/W4405926070","https://openalex.org/W4406046950","https://openalex.org/W4406354159","https://openalex.org/W4406472763","https://openalex.org/W4406890574","https://openalex.org/W4406891794","https://openalex.org/W4407051598","https://openalex.org/W4407111439","https://openalex.org/W4407157541","https://openalex.org/W4407199467","https://openalex.org/W4407449636","https://openalex.org/W4408200060","https://openalex.org/W4408340258","https://openalex.org/W4408479234","https://openalex.org/W4408508016","https://openalex.org/W4408898474","https://openalex.org/W4408994443","https://openalex.org/W4409140393","https://openalex.org/W4409219406","https://openalex.org/W4409238193","https://openalex.org/W4409277267","https://openalex.org/W4409349694","https://openalex.org/W4409536524","https://openalex.org/W4409724154","https://openalex.org/W4409762908","https://openalex.org/W4409919260","https://openalex.org/W4410226401","https://openalex.org/W4410229232","https://openalex.org/W4410529756","https://openalex.org/W4410585919","https://openalex.org/W4410716013","https://openalex.org/W4410780754","https://openalex.org/W4410856350","https://openalex.org/W4410859924","https://openalex.org/W4410932661","https://openalex.org/W4410985906","https://openalex.org/W4411011151","https://openalex.org/W4411019688","https://openalex.org/W4411264393","https://openalex.org/W4411306519","https://openalex.org/W4411358708","https://openalex.org/W4411447513","https://openalex.org/W4411466266","https://openalex.org/W4411665947","https://openalex.org/W4411691974","https://openalex.org/W4411800152","https://openalex.org/W4411935430","https://openalex.org/W4411949928","https://openalex.org/W4412002919","https://openalex.org/W4412578217","https://openalex.org/W4413267867","https://openalex.org/W6794677000","https://openalex.org/W6849608542","https://openalex.org/W6863077976","https://openalex.org/W6871637472","https://openalex.org/W6878070986","https://openalex.org/W6880210511","https://openalex.org/W6881055123"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Zero-day":[0],"attacks":[1],"pose":[2],"a":[3,33,50,56,126,177,190,195,201,213,236,262,281],"persistent":[4],"threat":[5,317],"to":[6,102,162,265,308],"computing":[7],"infrastructure":[8],"by":[9,194,260],"exploiting":[10],"previously":[11],"unknown":[12],"software":[13],"vulnerabilities":[14],"that":[15,153,169,219,240],"evade":[16],"traditional":[17],"signature-based":[18],"network":[19,41,52,294],"intrusion":[20],"detection":[21,39],"systems":[22],"(NIDSs).":[23],"To":[24,122],"address":[25],"this":[26,174],"limitation,":[27],"machine":[28],"learning":[29,63],"(ML)":[30],"techniques":[31,307],"offer":[32],"promising":[34],"approach":[35,264],"for":[36,249,269,286],"enhancing":[37],"anomaly":[38],"in":[40,234,293],"traffic.":[42],"This":[43,253],"study":[44,175],"evaluates":[45],"several":[46],"ML":[47,291],"models":[48],"on":[49,58,139],"labeled":[51],"traffic":[53],"dataset,":[54],"with":[55,104,221],"focus":[57],"zero-day":[59,76,163,250],"attack":[60,251],"detection.":[61,252],"Ensemble":[62],"methods,":[64],"particularly":[65],"eXtreme":[66],"gradient":[67],"boosting":[68],"(XGBoost),":[69],"achieved":[70,144],"perfect":[71],"classification,":[72],"identifying":[73],"all":[74],"6231":[75],"instances":[77],"without":[78],"false":[79],"positives":[80],"and":[81,85,115,134,148,215,244,304,315],"maintaining":[82],"efficient":[83],"training":[84],"prediction":[86],"times.":[87],"While":[88,271],"classical":[89,185],"support":[90],"vector":[91],"machines":[92],"(SVMs)":[93],"performed":[94],"modestly":[95],"at":[96],"64%":[97],"accuracy,":[98],"their":[99],"performance":[100],"improved":[101],"98%":[103],"the":[105,108,140,222,287],"use":[106],"of":[107,197,225,258,284,289],"borderline":[109],"synthetic":[110],"minority":[111],"oversampling":[112],"technique":[113],"(SMOTE)":[114],"SMOTE":[116],"+":[117],"edited":[118],"nearest":[119],"neighbours":[120],"(SMOTEENN).":[121],"explore":[123],"quantum-enhanced":[124],"alternatives,":[125],"quantum":[127,136,155,172,179,217,228,237,246,266,290,301],"SVM":[128],"(QSVM)":[129],"is":[130,187,205],"implemented":[131],"using":[132,189],"three-qubit":[133],"four-qubit":[135],"circuits":[137],"simulated":[138],"aer_simulator_statevector.":[141],"The":[142],"QSVM":[143],"high":[145],"accuracy":[146],"(99.89%)":[147],"strong":[149],"F1-scores":[150],"(98.95%),":[151],"indicating":[152],"nonlinear":[154,191],"feature":[156,180,186],"maps":[157],"(QFMs)":[158],"can":[159],"increase":[160],"sensitivity":[161],"exploit":[164],"patterns.":[165],"Unlike":[166],"prior":[167],"work":[168,297],"applies":[170],"standard":[171],"kernels,":[173],"introduces":[176],"parameterised":[178],"encoding":[181],"scheme,":[182],"where":[183],"each":[184],"mapped":[188],"function":[192],"tuned":[193],"set":[196],"learnable":[198],"parameters.":[199],"Additionally,":[200],"sparse":[202],"entanglement":[203],"topology":[204],"derived":[206],"from":[207],"mutual":[208],"information":[209],"between":[210],"features,":[211],"ensuring":[212],"compact":[214],"data-adaptive":[216],"circuit":[218,238,267],"aligns":[220],"resource":[223],"constraints":[224],"noisy":[226],"intermediate-scale":[227],"(NISQ)":[229],"devices.":[230],"Our":[231],"contribution":[232],"lies":[233],"formalising":[235],"design":[239],"enables":[241],"scalable,":[242],"expressive,":[243],"generalisable":[245],"architectures":[247],"tailored":[248],"extends":[254],"beyond":[255],"conventional":[256],"usage":[257],"QSVMs":[259],"offering":[261],"principled":[263],"construction":[268],"cybersecurity.":[270],"these":[272],"findings":[273],"are":[274],"obtained":[275],"via":[276],"noiseless":[277],"simulation,":[278],"they":[279],"provide":[280],"theoretical":[282],"proof":[283],"concept":[285],"viability":[288],"(QML)":[292],"security.":[295],"Future":[296],"should":[298],"target":[299],"real":[300],"hardware":[302],"execution":[303],"adaptive":[305],"sampling":[306],"assess":[309],"robustness":[310],"under":[311],"decoherence,":[312],"gate":[313],"errors,":[314],"dynamic":[316],"environments.":[318]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
