{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T04:05:05Z","timestamp":1747541105791,"version":"3.40.5"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01899-1","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T01:00:13Z","timestamp":1737334813000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization"],"prefix":"10.1007","volume":"18","author":[{"given":"Vinothini","family":"J","sequence":"first","affiliation":[]},{"given":"Srie Vidhya Janani","family":"E","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bello SA et al (2020) Cloud computing in construction industry: use cases, benefits and challenges. Autom Constr 122(1):103441","key":"1899_CR1","DOI":"10.1016\/j.autcon.2020.103441"},{"issue":"1","key":"1899_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00170-024-12989-y","volume":"131","author":"G Vahid","year":"2024","unstructured":"Vahid G et al (2024) Cloud based manufacturing: a review of recent developments in architectures, technologies, infrastructures, platforms and associated challenges. Int J Adv Manuf Technol 131(1):93\u2013123","journal-title":"Int J Adv Manuf Technol"},{"key":"1899_CR3","first-page":"166","volume":"2","author":"S Alhomdy","year":"2021","unstructured":"Alhomdy S, Thabit F, Abdulrazzak FH, Haldorai A, Jagtap S (2021) The role of cloud computing technology: a savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications. Int J Intell Networks 2:166\u2013174","journal-title":"Int J Intell Networks"},{"doi-asserted-by":"crossref","unstructured":"Hadwer A, Tavana M, Gillis D, Rezania D (2021) A systematic review of organizational factors impacting cloud-based technology adoption using technology-organization-environment framework. Internet Things 15:100407","key":"1899_CR4","DOI":"10.1016\/j.iot.2021.100407"},{"doi-asserted-by":"publisher","unstructured":"Cresswell K, Dom\u00ednguez Hern\u00e1ndez A, Williams R, Sheikh A (2021) Key challenges and opportunities for cloud technology in health care. Semistructured interview study. JMIR Hum 9(1). https:\/\/doi.org\/10.2196\/31246","key":"1899_CR5","DOI":"10.2196\/31246"},{"doi-asserted-by":"crossref","unstructured":"Ali T, Al-Khalidi M, Al-Zaidi R (2024) Information security risk assessment methods in cloud computing: comprehensive review. J Comput Inf Syst, 1\u201328","key":"1899_CR6","DOI":"10.1080\/08874417.2024.2329985"},{"issue":"6","key":"1899_CR7","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.1016\/j.jksuci.2021.01.008","volume":"34","author":"B Maniah","year":"2021","unstructured":"Maniah B, Soewito F, Lumban Gaol, Abdurachman E (2021) A systematic literature review: risk analysis in cloud migration. J King Saud Univ - Comput Inf Sci 34(6):3111\u20133120","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"1","key":"1899_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1365\/s43439-024-00111-7","volume":"5","author":"M Kianpour","year":"2024","unstructured":"Kianpour M, Raza S (2024) More than malware: unmasking the hidden risk of cybersecurity regulations. Int Cybersecurity Law Rev 5(1):169\u2013212","journal-title":"Int Cybersecurity Law Rev"},{"issue":"1","key":"1899_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/fi14010011","volume":"14","author":"YS Abdulsalam","year":"2021","unstructured":"Abdulsalam YS, Hedabou M (2021) Security and privacy in Cloud Computing: Technical Review. Future Internet 14(1):11","journal-title":"Future Internet"},{"doi-asserted-by":"crossref","unstructured":"Lili N, Zlatolas T, Welzer, Lhotska L (2024) Data breaches in healthcare: security mechanisms for attack mitigation. Cluster computing","key":"1899_CR10","DOI":"10.1007\/s10586-024-04507-2"},{"doi-asserted-by":"crossref","unstructured":"Cremer F et al (2022) Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap Risk Insur - Issues Pract 47(3):698","key":"1899_CR11","DOI":"10.1057\/s41288-022-00266-6"},{"doi-asserted-by":"crossref","unstructured":"Alawida M, Omolara AE, Abiodun OI, Al-Rajab M (2022) A deeper look into cybersecurity issues in the wake of Covid-19: A survey. J King Saud Univ - Comput Inf Sci 34(10):8176\u20138206","key":"1899_CR12","DOI":"10.1016\/j.jksuci.2022.08.003"},{"key":"1899_CR13","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.iotcps.2023.09.003","volume":"4","author":"F Alyazia Aldhaheri","year":"2024","unstructured":"Alyazia Aldhaheri F, Alwahedi MA, Ferrag, Battah A (2024) Deep learning for cyber threat detection in IoT networks: a review. Internet Things Cyber-Physical Syst 4:110\u2013128","journal-title":"Internet Things Cyber-Physical Syst"},{"doi-asserted-by":"crossref","unstructured":"Wu Y, Wei D, Feng J (2020) Network attacks detection methods based on deep learning techniques: a survey. Secur Commun Netw, 1\u201317","key":"1899_CR14","DOI":"10.1155\/2020\/8872923"},{"key":"1899_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","volume":"170","author":"M Abbasi","year":"2021","unstructured":"Abbasi M, Shahraki A, Taherkordi A (2021) Deep Learning for Network Traffic Monitoring and Analysis (NTMA): a survey. Comput Commun 170:19\u201341","journal-title":"Comput Commun"},{"doi-asserted-by":"crossref","unstructured":"Devendiran R, Turukmane AV (2024) Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 245:123027\u2013123027","key":"1899_CR16","DOI":"10.1016\/j.eswa.2023.123027"},{"doi-asserted-by":"crossref","unstructured":"Raviprasad B, Mohan CR, Devi GNR, Pugalenthi R, Manikandan LC, Ponnusamy S (2022) Accuracy determination using deep learning technique in cloud-based IoT sensor environment. Meas: Sensors 24:100459","key":"1899_CR17","DOI":"10.1016\/j.measen.2022.100459"},{"doi-asserted-by":"crossref","unstructured":"Ugurlu M, Dogru IA (2019) A survey on deep learning based intrusion detection system. 4th International Conference on Computer Science and Engineering (UBMK)","key":"1899_CR18","DOI":"10.1109\/UBMK.2019.8907206"},{"doi-asserted-by":"crossref","unstructured":"Soltani M, Ousat B, Siavoshani MJ, Jahangir AH (2023) An adaptable deep learning-based intrusion detection system to zero-day attacks. J Inf Secur Appl 76:103516\u2013103516","key":"1899_CR19","DOI":"10.1016\/j.jisa.2023.103516"},{"doi-asserted-by":"crossref","unstructured":"Khadka K, Chandrasekaran J, Lei Y, Kacker RN, Richard Kuhn D (2024) A combinatorial approach to hyperparameter optimization. 2024 IEEE\/ACM 3rd International Conference on AI Engineering \u2013 Software Engineering for AI (CAIN), Lisbon, Portugal, pp 140\u2013149","key":"1899_CR20","DOI":"10.1145\/3644815.3644941"},{"unstructured":"Wu J, Chen X-Y, Zhang H, Xiong L-D, Lei H, Deng S-H (2019) Hyperparameter optimization for machine learning models based on bayesian optimizationb. J Electron Sci Technol 17(1):26\u201340","key":"1899_CR21"},{"doi-asserted-by":"crossref","unstructured":"Sowmya T, Mary Anita EA (2023) A comprehensive review of AI based intrusion detection system, pp 100827\u2013100827","key":"1899_CR22","DOI":"10.1016\/j.measen.2023.100827"},{"doi-asserted-by":"publisher","unstructured":"Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) QoS-Aware Cost Minimization Strategy for AMI Applications in Smart Grid Using Cloud Computing. Sensors 22(13). https:\/\/doi.org\/10.3390\/s22134969","key":"1899_CR23","DOI":"10.3390\/s22134969"},{"doi-asserted-by":"crossref","unstructured":"Tabassum N, Reddyy CRK (2022) Review on QoS and security challenges associated with the internet of vehicles in cloud computing. Meas: Sensors 27:100562","key":"1899_CR24","DOI":"10.1016\/j.measen.2022.100562"},{"doi-asserted-by":"crossref","unstructured":"Khan A, Umar AI, Shirazi SH, Ishaq W, Shah M, Assam M, Mohamed A (2022) QoS-Aware cost minimization strategy for AMI applications in smart grid using cloud computing. Sensors 22(13):4969","key":"1899_CR25","DOI":"10.3390\/s22134969"},{"doi-asserted-by":"crossref","unstructured":"Prasad VK, Dansana D, Bhavsar MD, Acharya B, Gerogiannis VC, Kanavos A (2023) Efficient resource utilization in IoT and cloud computing. Information 14(11):619","key":"1899_CR26","DOI":"10.3390\/info14110619"},{"issue":"13","key":"1899_CR27","doi-asserted-by":"publisher","first-page":"5381","DOI":"10.3390\/app14135381","volume":"14","author":"WH Aljuaid","year":"2024","unstructured":"Aljuaid WH, Alshamrani SS (2024) A deep learning approach for intrusion detection systems in cloud computing environments. Appl Sci 14(13):5381","journal-title":"Appl Sci"},{"doi-asserted-by":"crossref","unstructured":"Balajee RM, Jayanthi Kannan MK (2023) Intrusion detection on AWS cloud through hybrid deep learning algorithm. Electronics 12(6):1423","key":"1899_CR28","DOI":"10.3390\/electronics12061423"},{"key":"1899_CR29","doi-asserted-by":"publisher","first-page":"181916","DOI":"10.1109\/ACCESS.2020.3028690","volume":"8","author":"A Bhardwaj","year":"2020","unstructured":"Bhardwaj A, Mangat V, Vig R (2020) Hyperband tuned deep neural network with well posed stacked sparse AutoEncoder for detection of DDoS attacks in Cloud. IEEE Access 8:181916\u2013181929","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Balasubramaniam S et al (2023) Optimization enabled deep learning-Based DDoS attack detection in cloud computing. Int J Intell Syst, e2039217","key":"1899_CR30","DOI":"10.1155\/2023\/2039217"},{"doi-asserted-by":"publisher","unstructured":"Long Z, Yan H, Shen G, Zhang X, He H, Cheng L (2024) A Transformer-based network intrusion detection approach for cloud security. Journal of Cloud Computing 13(1). https:\/\/doi.org\/10.1186\/s13677-023-00574-9","key":"1899_CR31","DOI":"10.1186\/s13677-023-00574-9"},{"doi-asserted-by":"crossref","unstructured":"Singh P, Ranga V (2021) Attack and intrusion detection in cloud computing using an ensemble learning approach. Int J Inf Technol 13(2):565\u2013571","key":"1899_CR32","DOI":"10.1007\/s41870-020-00583-w"},{"doi-asserted-by":"crossref","unstructured":"Aldhyani THH, Alkahtani H (2022) Artificial Intelligence algorithm-Based economic denial of sustainability attack detection systems: cloud computing environments. Sensors 22(13):4685","key":"1899_CR33","DOI":"10.3390\/s22134685"},{"doi-asserted-by":"crossref","unstructured":"Ramachandran D, Albathan M, Hussain A, Abbas Q (2023) Enhancing cloud-based security: a novel approach for efficient cyber-threat detection using GSCSO-IHNN model. Systems 11(10):518\u2013518","key":"1899_CR34","DOI":"10.3390\/systems11100518"},{"doi-asserted-by":"crossref","unstructured":"Sreenivasa Chakravarthi S, Jagadeesh Kannan R, Anantha Natarajan V, Gao X-Z (2022) Deep learning based intrusion detection in cloud services for resilience management, computers, materials & continua\/computers. Mater Continua (Print) 71(3):5117\u20135133","key":"1899_CR35","DOI":"10.32604\/cmc.2022.022351"},{"doi-asserted-by":"crossref","unstructured":"Kumar S, Dwivedi M, Kumar M, Gill SS (2024) A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services. Comput Sci Rev 53:100661\u2013100661","key":"1899_CR36","DOI":"10.1016\/j.cosrev.2024.100661"},{"issue":"1","key":"1899_CR37","doi-asserted-by":"publisher","first-page":"2058","DOI":"10.1109\/TCE.2023.3341696","volume":"70","author":"JK Samriya","year":"2024","unstructured":"Samriya JK, Chakraborty C, Sharma A, Kumar M, Ramakuri SK Adversarial ML-Based secured cloud architecture for consumer Internet of things of smart healthcare. IEEE Trans Consum Electron 70(1):2058\u20132065","journal-title":"IEEE Trans Consum Electron"},{"unstructured":"Samriya JK, Kumar S, Kumar M, Wu H, Gill SS (2024) Machine learning based network intrusion detection optimization for cloud computing environments. IEEE Trans Consum Electron, pp 1\u20131","key":"1899_CR38"},{"doi-asserted-by":"crossref","unstructured":"Suman OP, Kumar M (2023) Machine learning based theoretical and experimental analysis of DDoS attacks in cloud computing. 2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT), Dehradun, India, pp 526\u2013531","key":"1899_CR39","DOI":"10.1109\/DICCT56244.2023.10110201"},{"issue":"17","key":"1899_CR40","doi-asserted-by":"publisher","first-page":"3724","DOI":"10.3390\/math11173724","volume":"11","author":"D Kilichev","year":"2023","unstructured":"Kilichev D, Kim W (2023) Hyperparameter optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO. Mathematics 11(17):3724","journal-title":"Mathematics"},{"doi-asserted-by":"publisher","unstructured":"Indra G, Nirmala E, Nirmala G, Senthilvel PG (2024) An ensemble learning approach for intrusion detection in IoT-based smart cities. Peer-to-Peer Netw Appl 17(1). https:\/\/doi.org\/10.1007\/s12083-024-01776-x","key":"1899_CR41","DOI":"10.1007\/s12083-024-01776-x"},{"doi-asserted-by":"crossref","unstructured":"Bischl B, Binder M, Lang M, Pielok T, Richter J, Coors S, Thomas J, Ullmann T, Becker M, Boulesteix A-L, Deng D, Lindauer M (2023) Hyperparameter optimization: foundations, algorithms, best practices, and open challenges. WIREs Data Min Knowl Discov 13(2):e1484","key":"1899_CR42","DOI":"10.1002\/widm.1484"},{"doi-asserted-by":"crossref","unstructured":"Victoria AH, Maragatham G (May 2020) Automatic tuning of hyperparameters using bayesian optimization. Evolving Systems","key":"1899_CR43","DOI":"10.1007\/s12530-020-09345-2"},{"doi-asserted-by":"crossref","unstructured":"Ippolito PP (2022) Hyperparameter tuning, pp 231\u2013251","key":"1899_CR44","DOI":"10.1007\/978-3-030-88389-8_12"},{"doi-asserted-by":"crossref","unstructured":"Azam M et al (2024) A systematic review of hyperparameter optimization techniques in Convolutional Neural Networks. Decis Anal J, 100470\u2013100470","key":"1899_CR45","DOI":"10.1016\/j.dajour.2024.100470"},{"doi-asserted-by":"crossref","unstructured":"Khatamsaz D, Neuberger R, Roy AM, Zadeh SH, Otis R, Arr\u00f3yave R (2023) A physics informed Bayesian optimization approach for material design: application to NiTi shape memory alloys. NPJ Comput Mater 9(1):221","key":"1899_CR46","DOI":"10.1038\/s41524-023-01173-7"},{"doi-asserted-by":"crossref","unstructured":"Tay T, Osorio C (2022) Bayesian optimization techniques for high-dimensional simulation-based transportation problems. Transp Res B: Methodol 164:210\u2013243","key":"1899_CR47","DOI":"10.1016\/j.trb.2022.08.009"},{"doi-asserted-by":"crossref","unstructured":"Rapp F, Roth M (2024) Quantum Gaussian process regression for Bayesian optimization. Quantum Mach Intell 6(1):5","key":"1899_CR48","DOI":"10.1007\/s42484-023-00138-9"},{"issue":"2","key":"1899_CR49","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.32604\/cmc.2023.040567","volume":"76","author":"S Bhavani Mallampati","year":"2023","unstructured":"Bhavani Mallampati S, Hari S (2023) Fusion of feature ranking methods for an effective intrusion detection system. Computers Mater Continua 76(2):1721\u20131744","journal-title":"Computers Mater Continua"},{"doi-asserted-by":"crossref","unstructured":"Leevy JL, Khoshgoftaar TM (2020) A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 big data. J Big Data 7(1)","key":"1899_CR50","DOI":"10.1186\/s40537-020-00382-x"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01899-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01899-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01899-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:35:42Z","timestamp":1747474542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01899-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,20]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1899"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01899-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,1,20]]},"assertion":[{"value":"17 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"During the preparation of this work, the author(s) used ChatGPT and QuillBot for language improvement and Grammarly for grammar correction. After using these tools, the author(s) reviewed and edited the content as needed and take(s) full responsibility for the content of the publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of generative AI and AI-assisted technologies in the writing process"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"77"}}