Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper presents a quantum-enhanced key exchange protocol integrated with cloud aerospace infrastructures. The scheme provides secure satellite-ground data transfer, mitigating classical vulnerabilities and ensuring ultra-high integrity and confidentiality across mission-critical aerospace communication networks.
Benjamin Isaac Harlow, Jessica Penelope Fox, William Andrew Langley, Charlotte Abigail Morton, Edward Thomas Blake
Paper ID: 72422501 | ✅ Access Request |
A novel self-adaptive neural network is introduced for anomaly detection in multi-cloud infrastructures. It continuously learns normal system behavior and autonomously adapts to dynamic environments, providing high-accuracy alerts with minimal false positives for enhanced system reliability and cybersecurity assurance.
Samantha Ivy Greenwood, Patrick Wesley Knox, Rachel Elise Vaughan, Jacob Harrison Rees, Victoria Maynard Bentley
Paper ID: 72422502 | ✅ Access Request |
This research proposes a hybrid trust architecture combining blockchain-based identity validation and layered security protocols to defend autonomous vehicle cloud interfaces from spoofing and injection attacks while maintaining seamless communication and system performance.
Oliver James Stratton, Emily Francesca Holt, Henry Joseph Templeton, Amelia Charlotte Wright, Daniel Zachary Wilkins
Paper ID: 72422503 | ✅ Access Request |
The paper presents a federated identity authentication framework utilizing homomorphic encryption to enable privacy-preserving access to cross-region cloud services. The system supports seamless user experience while preventing identity leakage across federated cloud platforms.
Jonathan Rupert Sloane, Isabella Juliet Reed, Thomas Harvey Chandler, Grace Matilda Hopkins, Leo Patrick Fleming
Paper ID: 72422504 | ✅ Access Request |
We design a scalable threat intelligence engine using AI to perform real-time risk analysis in large cloud infrastructures. It fuses threat feeds and behavioral analytics, enabling proactive mitigation and rapid response to emerging cybersecurity threats.
George Nathaniel Carmichael, Madeleine Elise Newton, Zachary Owen Caldwell, Harriet Eleanor Forbes, Nicholas Rowan Sinclair
Paper ID: 72422505 | ✅ Access Request |
This paper introduces a zero-trust security framework with dynamic policy-aware access control for distributed cloud environments. It ensures minimal trust assumptions and continuous verification, significantly reducing lateral movement risks and enhancing multi-tenant cloud system security.
Julian Frederick Whitman, Clara Beatrice Ellison, Dominic Lucas Pryce, Eleanor Faith Hargrave, Sebastian Alfred Knox
Paper ID: 72422506 | ✅ Access Request |
We develop a suite of lightweight cryptographic algorithms optimized for securing edge-cloud IoT communications in industrial environments. The framework maintains confidentiality and integrity with minimal overhead, ensuring robust protection for smart manufacturing and critical infrastructure systems.
Louis Bernard Easton, Phoebe Caroline Radcliffe, Maxwell Adrian Grant, Felicity Annette Holbrook, Alexander Edward Rowley
Paper ID: 72422507 | ✅ Access Request |
Back