Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper presents a federated learning-based approach for detecting threats in edge-cloud networks. The system adapts to new anomalies with dynamic signature models, maintaining low latency and high accuracy without centralized data aggregation, ensuring privacy-preserving real-time cybersecurity monitoring.
Oliver Bradley McAllister, Fiona Isabelle Redgrave, Jack William Forsythe, Emily Kate Sanderson, Rupert Francis Holloway
Paper ID: 72422201 | ✅ Access Request |
This research introduces an AI-based patching strategy that forecasts system vulnerabilities and automates distribution in cloud ecosystems. The model integrates security analytics and threat intelligence to reduce exploit windows, offering proactive remediation in infrastructure-as-a-service (IaaS) environments.
Clara Evangeline Bowden, Tobias Arthur Whitmore, Julian Henry Bexley, Sophie Helena Mallory, Edward James Truscott
Paper ID: 72422202 | ✅ Access Request |
This study proposes a behavioral access control framework for decentralized cloud platforms. Risk levels are computed using context-aware metrics like user location, device fingerprint, and behavior history to authorize or restrict access in real time, improving security resilience.
Patrick Adrian Lonsdale, Florence Margaret Atherton, Daniel Charles Moorcroft, Rebecca Alice Fielding, Thomas Gerald Quenby
Paper ID: 72422203 | ✅ Access Request |
This paper develops a quantum key distribution protocol tailored for multi-cloud communications. Using entangled photon pairs and verification algorithms, the system secures data channels against MITM attacks, promoting robust inter-cloud cryptographic resilience in post-quantum threat scenarios.
Samuel Dominic Hargreaves, Imogen Elizabeth Carver, Oscar Elliot Drayton, Phoebe Harriet Linwood, Henry Maxwell Uxbridge
Paper ID: 72422204 | ✅ Access Request |
This paper introduces a hybrid model that combines statistical threat detection with AI predictions to adjust load balancing strategies for mission-critical cloud services. It improves both performance and resilience by prioritizing traffic through least-vulnerable nodes during cyber incidents.
Lucy Isabelle Fenwick, Alexander George Crowther, Chloe Beatrice Langdon, Jasper William Fitzroy, Felicity Anne Downing
Paper ID: 72422205 | ✅ Access Request |
This study introduces a temporal attack correlation model for forecasting cyber threats in cloud infrastructure. By analyzing time-sequenced threat data, the system identifies future intrusion trends and dynamically triggers security configurations to prevent breaches before actual compromise.
Frederick John Cartwright, Penelope Grace Ellsworth, Hugo Nathaniel Redman, Matilda Claire Barrington, Edward Lionel Godfrey
Paper ID: 72422206 | ✅ Access Request |
This paper proposes a lightweight encryption protocol to safeguard virtual machine migration between distributed cloud data centers. The model minimizes performance overhead while ensuring confidentiality and integrity, enabling seamless secure mobility of workloads in multi-tenant architectures.
Julian Michael Etheridge, Harriet Victoria Langley, Rowan David Northbridge, Alice Frances Merton, Dominic Charles Wetherby
Paper ID: 72422207 | ✅ Access Request |
This study develops a decentralized identity verification system using blockchain for secure multi-cloud access. It eliminates centralized failure points and enhances transparency, allowing users to control authentication without relying on third-party providers, improving trust and system independence.
Charles Edmund Bramley, Victoria Eleanor Millington, Sebastian Hugo Bramford, Olivia Mary Sutcliffe, Benjamin George Tennant
Paper ID: 72422208 | ✅ Access Request |
This paper introduces a graph-embedding-based context analysis framework for identifying insider threats in federated cloud systems. Behavioral context from access logs is modeled using node embeddings to highlight anomalies, enhancing proactive detection of unauthorized actions within organizations.
Isabelle Florence Huxley, Nathaniel Oscar Linton, Louisa Rachel Althorp, Thomas William Grantham, Clara Madeleine Fenner
Paper ID: 72422209 | ✅ Access Request |
Back