A Hybrid Deep Learning Approach for Adaptive Cloud Threat Detection with Integrated CNNs and RNNs in Cloud Access Security Brokers

Authors

DOI:

https://doi.org/10.18196/jrc.v6i3.25618

Keywords:

Behavior-Based Anomaly Detection, Adaptive CASB, CNNs, RNNs, Cloud Security, Real-Time Mitigation

Abstract

Cloud computing offers on-demand, scalable, and cost-effective deployment models but also struggles with sophisticated and rapidly-evolving cybersecurity threats. Static, rule-based approaches to data moved by traditional Cloud Access Security Brokers (CASBs) are seldom able to detect these threats. In this work, we introduce Adaptive CASB a new framework built on a new hybrid deep learning architecture combining Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs). CNNs learn spatial features in network traffic and RNNs find temporal dependencies, leading to robust static and dynamic threat detection. The system combines behavior-based anomaly detection with real-time threat intelligence applied to the Internet, providing adaptability to new attacks such as zero-day attacks. Experiments on benchmark datasets (e.g. NSL-KDD, UNSW-NB15) prove that our model outperforms the others with accuracy of 95%, precision of 92% and recall of 94%, which is significantly better than CASBs based on traditional techniques and machine learning models. Moreover, the automated threat response capabilities of the system send alerts and implement containment measures that mitigate threats in real-time. Such an Adaptive CASB framework signifies a scalable and cost-effective response to contemporary cloud security challenges, whilst also paving the way for future advancements, such as XAI integration and edge-computing optimization.

Author Biography

Israa Basim, University of Sfax

baghdad- al bunook

References

M. Chitra, R. Surianarayanan, V. S. Mahamuni, S. Mohammed, M. T. Keno, and S. Boopathi, “Study on cloud computing-empowered small and medium enterprises,” in Essential Information Systems Service Management, pp. 189–220, 2025, doi: 10.4018/979-8-3693-4227-5.ch008.

N. Patel, “Secure access service edge (sase): Evaluating the impact of convereged network security architectures in cloud computing,” Journal of Emerging Technologies and Innovative Research, vol. 11, no. 3, pp. e703–e714, 2024.

J. Mistry, A. Ganesh, R. Ramakrishnan, and J. Logeshwaran, “Iot based congenital heart disease prediction system to amplify the authentication and data security using cloud computing,” European Chemical Bulletin, vol. 12, pp. 7201–7213, 2023.

P. Raghuwanshi, “Integrating generative ai into iot-based cloud computing: Opportunities and challenges in the united states,” Journal of Artificial Intelligence General science (JAIGS), vol. 5, no. 1, pp. 451– 460, 2024, doi: 10.60087/jaigs.v5i1.223.

D. Dhinakaran, S. Sankar, D. Selvaraj, and S. E. Raja, “Privacy-preserving data in iot-based cloud systems: A comprehensive survey with ai integration,” arXiv, 2024, doi: 10.48550/arXiv.2401.00794.

O. R. Arogundade, “Addressing cloud computing security and visibility issues,” International Advanced Research Journal in Science, Engineering and Technology, vol. 10, no. 3, pp. 132–142, 2023, doi: 10.17148/IARJSET.2023.10321.

F. Rehman and S. Hashmi, “Enhancing cloud security: A comprehensive framework for real-time detection analysis and cyber threat intelligence sharing,” Advances in Science, Technology and Engineering Systems Journal, vol. 8, no. 6, pp. 107–119, 2023, doi: 10.25046/aj080612.

L. L. Scientific, “Enhancing cloud security based on the kyber key encapsulation mechanism,” Journal Of Theoretical And Applied Information Technology, vol. 102, no. 4, pp. 1643–1651, 2024.

S. Ali, S. A. Wadho, A. Yichiet, M. L. Gan, and C. K. Lee, “Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing,” Egyptian Informatics Journal, vol. 27, 2024, doi: 10.1016/j.eij.2024.100519.

B. Collier, Considerations for selecting and implementing cloud security solutions using cloud access security brokers, (Doktoral dissertation, Marymount University), 2023.

S. Rawther and S. Sivaji, “Protecting cloud computing environments from malicious attacks using multi-factor authentication and modified dna cryptography,” Recent Patents on Engineering, vol. 19, no. 1, 2025, doi: 10.2174/1872212118666230905141926.

O. Alkadi, N. Moustafa and B. Turnbull, “A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions,” in IEEE Access, vol. 8, pp. 104893-104917, 2020, doi: 10.1109/ACCESS.2020.2999715.

A. Aldhaheri, F. Alwahedi, M. A. Ferrag, and A. Battah, “Deep learning for cyber threat detection in iot networks: A review,” Internet of Things and Cyber-Physical Systems, vol. 4, pp. 110–128, 2024, doi: 10.1016/j.iotcps.2023.09.003.

R. Ahmad, I. Alsmadi, W. Alhamdani, and L. Tawalbeh, “Zero-day attack detection: a systematic literature review,” Artificial Intelligence Review, vol. 56, no. 10, pp. 10733–10811, 2023, doi: 10.1007/s10462-023-10437-z.

Y. Guo, “A review of machine learning-based zero-day attack detection: Challenges and future directions,” Computer communications, vol. 198, pp. 175–185, 2023, doi: 10.1016/j.comcom.2022.11.001.

E. Landril, S. Valente, G. Andersen, and C. Schneider, “Ransomware detection through dynamic behavior-based profiling using real-time crypto-anomaly filtering,” Control System Engineering, 2024, doi: 10.31219/osf.io/nvg65.

F. Skopik, M. Wurzenberger, G. Hold, M. Landauer and W. Kuhn, ¨ “Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems,” in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3158-3175, 2023, doi: 10.1109/TDSC.2022.3197265.

S. Skansi, “Convolutional neural networks,” Introduction to Deep Learning, pp. 121–133, 2018, doi: 10.1007/978-3-319-73004-2 6.

I. D. Mienye, T. G. Swart, and G. Obaido, “Recurrent neural networks: A comprehensive review of architectures, variants, and applications,” Information, vol. 15, no. 9, 2024, doi: 10.3390/info15090517.

K. H. Al-Saedi et al., “Enhancing cloud security through the integration of deep learning and data mining techniques: A comprehensive review,” Periodicals of Engineering and Natural Sciences, vol. 11, no. 3, pp. 176– 192, 2023.

M. E. Karar, F. Alsunaydi, S. Albusaymi, and S. Alotaibi, “A new mobile application of agricultural pests recognition using deep learning in cloud computing system,” Alexandria Engineering Journal, vol. 60, no. 5, pp. 4423–4432, 2021, doi: 10.1016/j.aej.2021.03.009.

Z. Yang, “Renewable energy management in smart grid with cloud security analysis using multi agent machine learning model,” Computers and Electrical Engineering, vol. 116, 2024, doi: 10.1016/j.compeleceng.2024.109177.

F. Turk, “Analysis of intrusion detection systems in unsw-nb15 and nsl- ¨ kdd datasets with machine learning algorithms,” Bitlis Eren Universitesi ¨ Fen Bilimleri Dergisi, vol. 12, no. 2, pp. 465–477, 2023, doi: 10.17798/bitlisfen.1240469.

S. Ahmad, S. Mehfuz, F. Mebarek-Oudina, and J. Beg, “Rsm analysis based cloud access security broker: a systematic literature review,” Cluster Computing, vol. 25, pp. 3733–3763, 2022, doi: 10.1007/s10586-022- 03598-z.

F. Saeed, A. Shiwlani, M. Umar, Z. Jahangir, A. Tahir, and S. Shiwlani, “Hepatocellular carcinoma prediction in hcv patients using machine learning and deep learning techniques,” Jurnal Ilmiah Computer Science, vol. 3, no. 2, pp. 120–134, 2025, doi: 10.58602/jics.v3i2.48.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.

L. Wang, W. Guo, J. Guo, S. Zheng, Z. Wang, H. S. Kang, and H. Li, “An integrated deep learning model for intelligent recognition of longdistance natural gas pipeline features,” Reliability Engineering & System Safety, vol. 255, 2025, doi: 10.1016/j.ress.2024.110664.

M. A. Al-Shareeda, S. Manickam and M. A. Saare, “Intelligent Dronebased IoT Technology for Smart Agriculture System,” 2022 International Conference on Data Science and Intelligent Computing (ICDSIC), pp. 41-45, 2022, doi: 10.1109/ICDSIC56987.2022.10076170.

T. Kulvicius et al., “Deep learning empowered sensor fusion boosts infant movement classification,” Communications Medicine, vol. 5, no. 1, 2025, doi: 10.1038/s43856-024-00701-w.

C. Liang, Q. Wei, J. Du, Y. Wang, and Z. Jiang, “Survey of source code vulnerability analysis based on deep learning,” Computers & Security, vol. 148, 2025, doi: 10.1016/j.cose.2024.104098.

M. M. A. Al-shareeda, M. Anbar, M. A. Alazzawi, S. Manickam, and I. H. Hasbullah, “Security schemes based conditional privacypreserving in vehicular ad hoc networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, 2020, doi: 10.11591/ijeecs.v21.i1.pp479-488.

M. J. Almansor et al., “Routing protocols strategies for flying adhoc network (fanet): Review, taxonomy, and open research issues,” Alexandria Engineering Journal, vol. 109, pp. 553–577, 2024, doi: 10.1016/j.aej.2024.09.032.

A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, “A novel ddos mitigation strategy in 5g-based vehicular networks using chebyshev polynomials,” Arabian Journal for Science and Engineering, vol. 49, no. 9, pp. 11991–12004, 2024, doi: 10.1007/s13369-023-08535-9.

Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.

B. A. Mohammed, M. A. Al-Shareeda, S. Manickam, Z. G. Al-Mekhlafi, A. M. Alayba, and A. A. Sallam, “Anaa-fog: A novel anonymous authentication scheme for 5g-enabled vehicular fog computing,” Mathematics, vol. 11, no. 6, 2023, doi: 10.3390/math11061446.

P. Li, J. Li, Z. Huang, T. Li, C.-Z. Gao, S.-M. Yiu, and K. Chen, “Multi-key privacy-preserving deep learning in cloud computing,” Future Generation Computer Systems, vol. 74, pp. 76–85, 2017, doi: 10.1016/j.future.2017.02.006.

F. Jauro, H. Chiroma, A. Y. Gital, M. Almutairi, M. A. Shafi’i, and J. H. Abawajy, “Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend,” Applied Soft Computing, vol. 96, 2020, doi: 10.1016/j.asoc.2020.106582.

M. A. Sarwar, Y. -A. Daraghmi, K. -W. Liu, H. -C. Chi, T. . -U. ˙Ik and Y. -L. Li, “Smart Shopping Carts Based on Mobile Computing and Deep Learning Cloud Services,” 2020 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2020, doi: 10.1109/WCNC45663.2020.9120574.

M. A. Al-Shareeda, S. Manickam, and M. A. Saare, “Ddos attacks detection using machine learning and deep learning techniques: Analysis and comparison,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 2, pp. 930–939, 2023, doi: 10.11591/eei.v12i2.4466.

J. Zhang, L. Pan, Q. -L. Han, C. Chen, S. Wen and Y. Xiang, “Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey,” in IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 377-391, 2022, doi: 10.1109/JAS.2021.1004261.

Y. Li, J. Hua, H. Wang, C. Chen and Y. Liu, “DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection,” 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), pp. 263-274, 2021, doi: 10.1109/ICSE43902.2021.00035.

Y.-L. Zhang et al., “Distributed deep forest and its application to automatic detection of cash-out fraud,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 5, pp. 1–19, 2019, doi: 10.1145/3342241.

A. Miglani and N. Kumar, “Blockchain management and machine learning adaptation for iot environment in 5g and beyond networks: A systematic review,” Computer Communications, vol. 178, pp. 37–63, 2021, doi: 10.1016/j.comcom.2021.07.009.

L. Guo, R. Song, J. Wu, Z. Xu, and F. Zhao, “Integrating a machine learning-driven fraud detection system based on a risk management framework,” Preprints, pp. 1–9, 2024, doi: 10.20944/preprints202406.1756.v1.

R. Bin Sulaiman, V. Schetinin, and P. Sant, “Review of machine learning approach on credit card fraud detection,” Human-Centric Intelligent Systems, vol. 2, no. 1, pp. 55–68, 2022, doi: 10.1007/s44230-022-00004- 0.

V. Chang, Q. A. Xu, S. H. Akinloye, V. Benson, and K. Hall, “Prediction of bank credit worthiness through credit risk analysis: an explainable machine learning study,” Annals of Operations Research, pp. 1–25, 2024, doi: 10.1007/s10479-024-06134-x.

I. Sadgali, N. Sael, and F. Benabbou, “Adaptive model for credit card fraud detection,” The Learning and Technology Library, 2020.

Y. Wei, K. Xu, J. Yao, M. Sun, and Y. Sun, “Financial risk analysis using integrated data and transformer-based deep learning,” Journal of Computer Science and Software Applications, vol. 4, no. 7, pp. 1–8, 2024.

B. Gao, “The use of machine learning combined with data mining technology in financial risk prevention,” Computational economics, vol. 59, no. 4, pp. 1385–1405, 2022, doi: 10.1007/s10614-021-10101-0.

Y. Xiong, L. Liang, L. Wang, J. She, and M. Wu, “Identification of cash crop diseases using automatic image segmentation algorithm and deep learning with expanded dataset,” Computers and Electronics in Agriculture, vol. 177, 2020, doi: 10.1016/j.compag.2020.105712.

E. Benhamou, D. Saltiel, J. -J. Ohana and J. Atif, “Detecting and adapting to crisis pattern with context based Deep Reinforcement Learning,” 2020 25th International Conference on Pattern Recognition (ICPR), pp. 10050- 10057, 2021, doi: 10.1109/ICPR48806.2021.9412958.

M. M. Taye, “Theoretical understanding of convolutional neural network: Concepts, architectures, applications, future directions,” Computation, vol. 11, no. 3, 2023, doi: 10.3390/computation11030052.

Z. Li, F. Liu, W. Yang, S. Peng and J. Zhou, “A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects,” in IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 12, pp. 6999-7019, 2022, doi: 10.1109/TNNLS.2021.3084827.

G. Chen, “Recurrent neural networks (rnns) learn the constitutive law of viscoelasticity,” Computational Mechanics, vol. 67, no. 3, pp. 1009–1019, 2021, doi: 10.1007/s00466-021-01981-y.

H. D. K. Al-Janabi et al., “D-BlockAuth: An Authentication SchemeBased Dual Blockchain for 5G-Assisted Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 99321-99332, 2024, doi: 10.1109/ACCESS.2024.3428830.

M. A. Al-Shareeda, S. Manickam, M. A. Saare, and N. C. Arjuman, “Proposed security mechanism for preventing fake router advertisement attack in ipv6 link-local network,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 29, no. 1, pp. 518–526, 2023, doi: 10.11591/ijeecs.v29.i1.pp518-526.

E. Blue, G. Campbell, A. Stokes, L. Thompson, and J. Clarke, “Ransomware detection on linux operating system using recurrent neural networks with binary opcode analysis,” Preprint, 2024, doi: 10.31219/osf.io/vzk3d.

T. Fossum and V. Andersen, Investigating cloud access security broker in a healthcare service: Creating a cloud access security broker (casb) discussion frame-work for evaluating security in cloud healthcare services, Master’s thesis, University of Agder, 2021.

M. A. Al-Shareeda, A. A. Alsadhan, H. H. Qasim, and S. Manickam, “The fog computing for internet of things: review, characteristics and challenges, and open issues,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 2, pp. 1080–1089, 2024, doi: 10.11591/eei.v13i2.5555.

K. Ramesha, Adaptive cloud access security broker, Ph.D. dissertation, Dublin, National College of Ireland, 2023.

M. Yamauchi, Y. Ohsita, M. Murata, K. Ueda and Y. Kato, “Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions,” in IEEE Transactions on Consumer Electronics, vol. 66, no. 2, pp. 183-192, 2020, doi: 10.1109/TCE.2020.2981636.

R. Nayak, U. C. Pati, and S. K. Das, “A comprehensive review on deep learning-based methods for video anomaly detection,” Image and Vision Computing, vol. 106, 2021, doi: 10.1016/j.imavis.2020.104078.

A. Choudhary, A. Tripathi, A. Sharma and R. Singh, “Evolution and comparative analysis of different Cloud Access Security Brokers in current era,” 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), pp. 36-43, 2022, doi: 10.1109/ICFIRTP56122.2022.10059416.

M. A. Al-Shareeda et al., “Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks,” Sensors, vol. 22, no. 13, 2022, doi: 10.3390/s22135026.

H. Javed et al., “Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems,” in IEEE Access, vol. 12, pp. 12062-12079, 2024, doi: 10.1109/ACCESS.2023.3346432.

F. Jimmy, “Cloud security posture management: tools and techniques,” Journal of Knowledge Learning and Science Technology, vol. 2, no. 3, 2023, doi: 10.60087/jklst.vol2.n3.p622ss.

M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil and I. H. Hasbullah, “Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey,” in IEEE Access, vol. 9, pp. 121522-121531, 2021, doi: 10.1109/ACCESS.2021.3109264.

W. Ahmad, M. A. Almaiah, A. Ali and M. A. Al-Shareeda, “Deep Learning Based Network intrusion detection for unmanned aerial vehicle (UAV),” 2024 7th World Conference on Computing and Communication Technologies (WCCCT), pp. 31-36, 2024, doi: 10.1109/WCCCT60665.2024.10541665.

M. Al Shareeda, A. Khalil, and W. Fahs, “Realistic heterogeneous geneticbased rsu placement solution for v2i networks.” The International Arab Journal of Information Technology, vol. 16, no. 3A, pp. 540–547, 2019.

S. Choudhary and N. Kesswani, “Analysis of kdd-cup’99, nsl-kdd and unsw-nb15 datasets using deep learning in iot,” Procedia Computer Science, vol. 167, pp. 1561–1573, 2020, doi: 10.1016/j.procs.2020.03.367.

A. Parashar, A. Parashar, W. Ding, M. Shabaz, and I. Rida, “Data preprocessing and feature selection techniques in gait recognition: A comparative study of machine learning and deep learning approaches,” Pattern Recognition Letters, vol. 172, pp. 65–73, 2023, doi: 10.1016/j.patrec.2023.05.021.

M. J. Almansor, N. M. Din, M. Z. Baharuddin, H. M. Alsayednoor, M. A. Al-Shareeda, M. Ma, and A. M. Ramly, “A review of seaport microgrids for green maritime transportation: The shore and the seaside,” Journal of Robotics and Control (JRC), vol. 5, no. 3, pp. 839–850, 2024, doi: 10.18196/jrc.v5i3.21723.

A. Kayyidavazhiyil, “Intrusion detection using enhanced genetic sine swarm algorithm based deep meta-heuristic ann classifier on unsw-nb15 and nsl-kdd dataset,” Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 1–23, 2023, doi: 10.3233/JIFS-224283.

M. M. Hamdi, A. S. Mustafa, H. F. Mahd, M. S. Abood, C. Kumar and M. A. Al-shareeda, “Performance Analysis of QoS in MANET based on IEEE 802.11b,” 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1-5, 2020, doi: 10.1109/INOCON50539.2020.9298362.

R. Satapathy, Y. Li, S. Cavallari and E. Cambria, “Seq2Seq Deep Learning Models for Microtext Normalization,” 2019 International Joint Conference on Neural Networks (IJCNN), pp. 1-8, 2019, doi: 10.1109/IJCNN.2019.8851895.

A. Khaled, “Bcn: batch channel normalization for image classification,” in International Conference on Pattern Recognition, vol. 15311, pp. 295– 308, 2025, doi: 10.1007/978-3-031-78195-7 20.

S. Benyahia, B. Meftah, and O. Lezoray, “Multi-features extraction based ´ on deep learning for skin lesion classification,” Tissue and Cell, vol. 74, 2022, doi: 10.1016/j.tice.2021.101701.

L. Huang, J. Qin, Y. Zhou, F. Zhu, L. Liu and L. Shao, “Normalization Techniques in Training DNNs: Methodology, Analysis and Application,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 8, pp. 10173-10196, 2023, doi: 10.1109/TPAMI.2023.3250241.

M. Al Shareeda, A. Khalil and W. Fahs, “Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm,” 2018 International Arab Conference on Information Technology (ACIT), pp. 1-5, 2018, doi: 10.1109/ACIT.2018.8672687.

J. Wu, “Introduction to convolutional neural networks,” National Key Lab for Novel Software Technology, vol. 5, no. 23, pp. 1–31, 2017.

S. Skansi, “Convolutional neural networks,” in Introduction to Deep Learning, pp. 121–133, 2018, doi: 10.1007/978-3-319-73004-2 6.

J. Zhu, Q. Jiang, Y. Shen, C. Qian, F. Xu, and Q. Zhu, “Application of recurrent neural network to mechanical fault diagnosis: A review,” Journal of Mechanical Science and Technology, vol. 36, no. 2, pp. 527–542, 2022, doi: 10.1007/s12206-022-0102-1.

M. A. Al-shareeda, M. Anbar, S. Manickam, I. H. Hasbullah, N. Abdullah, M. M. Hamdi, and A. S. Al-Hiti, “Ne-cppa: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (vanets),” Applied Mathematics & Information Sciences, vol. 14, no. 6, pp. 1–10, 2020, doi: 10.18576/amis/140602.

M. Al-Shareeda, D. Hergast, and S. Manickam, “Review of intelligent healthcare for the internet of things: Challenges, techniques and future directions,” ournal of Sensor Networks and Data Communications, vol. 4, no. 1, pp. 01–10, 2024.

D. Krstinic, M. Braovi ´ c, L. ´ Seri ˇ c, and D. Bo ´ ziˇ c-´ Stuli ˇ c, “Multi-label ´ classifier performance evaluation with confusion matrix,” Computer Science & Information Technology, vol. 1, pp. 1–14, 2020, doi: 10.5121/csit.2020.100801.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, “Eca-vfog: An efficient certificateless authentication scheme for 5gassisted vehicular fog computing,” Plos one, vol. 18, no. 6, 2023, doi: 10.1371/journal.pone.0287291.

N. Khan, M. I. Mohmand, S. u. Rehman, Z. Ullah, Z. Khan, and W. Boulila, “Advancements in intrusion detection: A lightweight hybrid rnn-rf model,” Plos one, vol. 19, no. 6, 2024, doi: 10.1371/journal.pone.0299666.

M. Bakro et al., “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model,” in IEEE Access, vol. 12, pp. 8846-8874, 2024, doi: 10.1109/ACCESS.2024.3353055.

M. Bansal, A. Goyal, and A. Choudhary, “A comparative analysis of knearest neighbor, genetic, support vector machine, decision tree, and long short term memory algorithms in machine learning,” Decision Analytics Journal, vol. 3, 2022, doi: 10.1016/j.dajour.2022.100071.

A. B. Nassif, M. A. Talib, Q. Nasir, H. Albadani and F. M. Dakalbab, “Machine Learning for Cloud Security: A Systematic Review,” in IEEE Access, vol. 9, pp. 20717-20735, 2021, doi: 10.1109/ACCESS.2021.3054129.

Downloads

Published

2025-05-08

Issue

Section

Articles