2021
DOI: 10.1007/s00521-021-06085-5
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 31 publications
0
20
0
Order By: Relevance
“…Prabhakaran and Kulandasamy 36 have presented hybrid semantic deep learning (HSDL) architecture by incorporating long short‐term memory, support vector machine, convolutional neural network. Using a semantic layer called Word2Vec embedding layer, the semantic data included in the network traffic was found.…”
Section: Literature Surveymentioning
confidence: 99%
“…Prabhakaran and Kulandasamy 36 have presented hybrid semantic deep learning (HSDL) architecture by incorporating long short‐term memory, support vector machine, convolutional neural network. Using a semantic layer called Word2Vec embedding layer, the semantic data included in the network traffic was found.…”
Section: Literature Surveymentioning
confidence: 99%
“…The new conceptions presented using the clouds, like computational outsourcing, sharing of resources and external data warehouse, maximize in security and privacy concern are created new security challenges. Also, huge scale clouds, the proliferation of mobile access devices (smart phones, tablets), direct access to cloud infrastructure amplifies the cloud vulnerabilities and threats 24 . Nowadays, clouds become more popular and their security concern grows bigger, because they become more attractive attack for the targets and the attention of digital assets.…”
Section: Introductionmentioning
confidence: 99%
“…Also, huge scale clouds, the proliferation of mobile access devices (smart phones, tablets), direct access to cloud infrastructure amplifies the cloud vulnerabilities and threats. 24 Nowadays, clouds become more popular and their security concern grows bigger, because they become more attractive attack for the targets and the attention of digital assets. An ID plays a major role in the cloud security, because it identifies the unknown and known attacks efficiently.…”
Section: Introductionmentioning
confidence: 99%
“…The concept of utilizing different machine learning (ML) in Neuro-Cryptography is growing rapidly. Various researchers have proposed many Neuro-Cryptography rules [14][15][16].…”
Section: Introductionmentioning
confidence: 99%