⏩ Volume 22, Issue No.6, 2024 (CNI)
Behavior-Based Malware Detection Using Deep Recurrent Networks and Feature-Aware Temporal Attention Mechanisms

This research introduces a novel behavior-based malware detection framework that leverages recurrent neural networks with temporal attention. The model effectively captures malicious process behaviors over time, increasing detection accuracy and minimizing false positives in complex cybersecurity environments.

Julian Patrick Simmons, Olivia Beatrice Turner, Samuel Henry Collins, Isabelle Sophia Webb, Arthur James Mitchell

Paper ID: 72422601
✅ Access Request

Zero Trust Access Control in Microservices Using Decentralized Identity Verification and Policy-Aware Proxies

This study presents a zero-trust framework for microservices using decentralized identity systems and intelligent policy proxies. The proposed architecture enhances access security in distributed environments by enforcing per-request authentication and authorization at microservice entry points.

Clara Evelyn Sharp, Benjamin Oscar Fletcher, Lucy Matilda Andrews, Edward Harrison Payne, Florence Harriet Barker

Paper ID: 72422602
✅ Access Request

Resilient Cloud Infrastructure Security Using Blockchain-Backed Audit Trails and AI-Powered Intrusion Responses

The paper proposes a hybrid security system combining blockchain-based audit trails and AI-enabled intrusion response. Designed for cloud infrastructures, the model ensures tamper-proof logging and real-time automated countermeasures against detected breaches, significantly enhancing data protection and compliance transparency.

Theodore Isaac Franklin, Georgia Rose Baxter, Sebastian Daniel Hart, Jessica Louise Walsh, Harrison Michael Blake

Paper ID: 72422603
✅ Access Request

Post-Quantum Cryptographic Protocol Design for Securing Cloud Communication Against Quantum Computing Threats

This study proposes novel cryptographic protocols based on lattice-based security primitives to protect cloud data transmission. The protocols are designed to remain secure against future quantum threats, enabling organizations to transition toward post-quantum resilience in cloud infrastructure.

Louis Zachary Bennett, Victoria Daisy Ferguson, Thomas George Yates, Amelia Rose Chapman, William Charles Howell

Paper ID: 72422604
✅ Access Request

Secure Federated Analytics Using Encrypted Model Updates and Differential Privacy for Healthcare Data

This paper presents a privacy-preserving federated learning framework for healthcare data analysis. By combining encrypted gradient exchanges with differential privacy, the model enables collaborative analytics without exposing sensitive patient information, ensuring both performance and regulatory compliance across institutions.

Matthew Joseph Coleman, Harriet Louise Douglas, Oscar William Hunt, Molly Grace Chapman, Alexander Edward Knight

Paper ID: 72422605
✅ Access Request

Lightweight Cryptographic Key Management for IoT-Enabled Smart Cities Using AI-Driven Revocation Mechanisms

This study introduces an intelligent cryptographic key management framework tailored for smart cities. It combines lightweight encryption with AI-driven key revocation, optimizing security for resource-constrained IoT nodes while maintaining integrity and availability in large-scale urban network deployments.

Chloe Alexandra Warren, Nathan Elijah Wilkinson, Emily Charlotte Hayes, James Oliver Barrett, Megan Isabelle Gilbert

Paper ID: 72422606
✅ Access Request

Adversarial Machine Learning Attacks on Cloud-Based Intrusion Detection Systems and Their Robust Mitigation Strategies

This paper analyzes adversarial threats targeting cloud-hosted intrusion detection systems and proposes countermeasures using ensemble defense models. The approach detects manipulated inputs while preserving detection accuracy, ensuring robust and adaptive threat intelligence for cloud security infrastructures.

Daniel Frederick Holmes, Lucy Amelia Mason, Leo Jonathan Fisher, Alice Georgia Hammond, Joseph Samuel Mills

Paper ID: 72422607
✅ Access Request

Blockchain-Assisted Secure Multi-Party Computation for Distributed Health Data Analytics in Federated Networks

We propose a blockchain-integrated secure multi-party computation protocol for health data analytics in federated settings. The framework ensures data confidentiality and auditability across multiple healthcare entities without compromising individual data ownership or compliance with privacy regulations.

Freddie Thomas Baldwin, Eleanor Rose Pearson, Isaac William Rowe, Sophie Elizabeth Quinn, George Alexander Harvey

Paper ID: 72422608
✅ Access Request

Back