{"id":"https://openalex.org/W4415912574","doi":"https://doi.org/10.58346/jisis.2025.i3.013","title":"Study on Identification of Trojan Horse Infections for Securing Financial Cloud","display_name":"Study on Identification of Trojan Horse Infections for Securing Financial Cloud","publication_year":2025,"publication_date":"2025-08-30","ids":{"openalex":"https://openalex.org/W4415912574","doi":"https://doi.org/10.58346/jisis.2025.i3.013"},"language":null,"primary_location":{"id":"doi:10.58346/jisis.2025.i3.013","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.013","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.013","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.58346/jisis.2025.i3.013","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120264588","display_name":"Yoghesh Dharangutti","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yoghesh Dharangutti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104324852","display_name":"Sumitra Padmanabhan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr. Sumitra Padmanabhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036504181","display_name":"Rita Rani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Hannah Jessie Rani","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109738312","display_name":"Manish Nagpal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manish Nagpal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023933722","display_name":"Divya Paikaray","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Divya Paikaray","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5106605936","display_name":"Shreya Ghosal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shreya Ghosal","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5120264588"],"corresponding_institution_ids":[],"apc_list":{"value":550,"currency":"USD","value_usd":550},"apc_paid":{"value":550,"currency":"USD","value_usd":550},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47177131,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"3","first_page":"189","last_page":"199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.16269999742507935,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.16269999742507935,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.12449999898672104,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.10750000178813934,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8651000261306763},{"id":"https://openalex.org/keywords/trojan-horse","display_name":"Trojan horse","score":0.6520000100135803},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.582099974155426},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5575000047683716},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5254999995231628},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.522599995136261},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.353300005197525},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.3497999906539917},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.34880000352859497}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8651000261306763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6962000131607056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6697999835014343},{"id":"https://openalex.org/C2777337426","wikidata":"https://www.wikidata.org/wiki/Q14639","display_name":"Trojan horse","level":2,"score":0.6520000100135803},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.582099974155426},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5575000047683716},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5254999995231628},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.522599995136261},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.353300005197525},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.3497999906539917},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.34880000352859497},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.32030001282691956},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.25609999895095825},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2554999887943268},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.58346/jisis.2025.i3.013","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.013","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.013","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.58346/jisis.2025.i3.013","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.013","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.013","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415912574.pdf","grobid_xml":"https://content.openalex.org/works/W4415912574.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"An":[0],"internet-wide":[1],"computer":[2],"network":[3,15],"is":[4,16],"made":[5],"up":[6],"of":[7,26,43,59,89,127],"several":[8,105],"machines":[9],"that":[10,53],"are":[11,93,104,117],"connected,":[12],"whether":[13],"the":[14,60,109,119,125,130,149,179,197,210],"built":[17],"using":[18],"traditional":[19],"infrastructure":[20],"or":[21],"cloud":[22,65,110,139,150],"computing":[23,111,128,140],"technology.":[24],"All":[25],"these":[27,70],"goods,":[28],"services":[29,52,136],"and":[30,86,96,141,146,158,204],"programs":[31],"come":[32],"together":[33,38],"in":[34,98,108,124,129,148],"one":[35],"technical":[36],"framework,":[37],"with":[39,169,209],"a":[40,47],"large":[41],"amount":[42],"database":[44],"storage,":[45],"creating":[46],"valuable":[48],"resource":[49],"variety.":[50],"Internet":[51],"enable":[54],"consumers":[55],"to":[56,69,160],"make":[57],"use":[58,88],"vast":[61],"possibilities":[62],"provided":[63],"by":[64,138,164],"technology":[66,100],"facilitate":[67],"access":[68],"products.":[71],"Cloud":[72,175],"computing's":[73],"many":[74],"benefits":[75],"include":[76],"low":[77],"cost,":[78],"easy-to-use":[79],"self-service":[80],"accessibility,":[81],"built-in":[82],"flexibility,":[83],"smooth":[84],"scalability,":[85],"efficient":[87],"virtualised":[90],"resources,":[91],"which":[92],"driving":[94],"creativity":[95],"effectiveness":[97],"contemporary":[99],"paradigms.":[101],"However,":[102],"there":[103],"security":[106,122],"vulnerabilities":[107],"(CC)":[112],"setup.":[113],"Trojan":[114],"horses":[115],"(TH)":[116],"among":[118],"most":[120],"frequent":[121],"issues":[123],"context":[126],"cloud.":[131],"The":[132,193],"TH":[133,152,170,191],"can":[134],"compromise":[135],"offered":[137],"harm":[142],"virtual":[143],"machines,":[144],"apps":[145],"resources":[147],"infrastructure.":[151],"assaults":[153],"could":[154],"be":[155],"hazardous,":[156],"intricate":[157],"hard":[159],"identify.":[161],"We":[162,177],"begin":[163],"assembling":[165],"an":[166],"extensive":[167],"dataset":[168],"Infections":[171],"for":[172,188],"Securing":[173],"Financial":[174],"data.":[176],"proposed":[178],"Adaptive":[180],"Butterfly":[181],"optimised":[182],"Hierarchical":[183],"Random":[184],"Forest":[185],"(ABO-HRF)":[186],"technique":[187],"accurately":[189],"estimating":[190],"detection.":[192],"suggested":[194],"approach":[195],"improves":[196],"accuracy":[198],"(89.56%),":[199],"precision":[200],"(88.32%),":[201],"recall":[202],"(82.54%),":[203],"F1":[205],"score":[206],"(84.68%)":[207],"compared":[208],"current":[211],"methods.":[212]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-11-05T00:00:00"}
