{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:11:34Z","timestamp":1760746294575,"version":"build-2065373602"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02082-w","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T03:40:49Z","timestamp":1757907649000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LeSMO-ALB2TM: Data security in educational cloud using lattice signature scheme and optimized deep learning framework for attack detection"],"prefix":"10.1007","volume":"18","author":[{"given":"Kavuri KSVA","family":"Satheesh","sequence":"first","affiliation":[]},{"given":"T.","family":"krishnaSree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"issue":"3","key":"2082_CR1","first-page":"438","volume":"21","author":"A Guezzaz","year":"2019","unstructured":"Guezzaz A, Asimi A, Asimi Y, Tbatou Z, Sadqi Y (2019) A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier. Int J Netw Secur 21(3):438\u2013450","journal-title":"Int J Netw Secur"},{"issue":"5","key":"2082_CR2","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1109\/TCSS.2021.3122807","volume":"9","author":"F Chen","year":"2021","unstructured":"Chen F, Tang Y, Wang C, Huang J, Huang C, Xie D, Wang T, Zhao C (2021) Medical cyber\u2013physical systems: a solution to smart health and the state of the art. IEEE Trans Comput Social Syst 9(5):1359\u20131386","journal-title":"IEEE Trans Comput Social Syst"},{"issue":"3","key":"2082_CR3","doi-asserted-by":"publisher","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","volume":"14","author":"B Hammi","year":"2020","unstructured":"Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst J 14(3):3440\u20133450","journal-title":"IEEE Syst J"},{"key":"2082_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.aej.2024.12.057","volume":"116","author":"M Alotaibi","year":"2025","unstructured":"Alotaibi M, Mengash HA, Alqahtani H, Al-Sharafi AM, Yahya AE, Alotaibi SR, Khadidos AO, Yafoz A (2025) Hybrid GWQBBA model for optimized classification of attacks in intrusion detection system. Alex Eng J 116:9\u201319","journal-title":"Alex Eng J"},{"key":"2082_CR5","doi-asserted-by":"publisher","first-page":"100073","DOI":"10.1016\/j.csa.2024.100073","volume":"3","author":"KVK Chithanya","year":"2025","unstructured":"Chithanya KVK, Reddy L (2025) Automatic intrusion detection model with secure data storage on cloud using adaptive cyclic shift transposition with enhanced ANFIS classifier. Cyber Secur Appl 3:100073","journal-title":"Cyber Secur Appl"},{"issue":"2","key":"2082_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/computers12020034","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan A (2023) A novel deep learning-based intrusion detection system for IOT networks. Computers 12(2):34","journal-title":"Computers"},{"issue":"1","key":"2082_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","volume":"13","author":"M Sajid","year":"2024","unstructured":"Sajid M, Malik KR, Almogren A, Malik TS, Khan AH, Tanveer J, Rehman AU (2024) Enhancing intrusion detection: a hybrid machine and deep learning approach. J Cloud Comput 13(1):123","journal-title":"J Cloud Comput"},{"key":"2082_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3290613","author":"H Xu","year":"2023","unstructured":"Xu H, Sun L, Fan G, Li W, Kuang G (2023) A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3290613","journal-title":"IEEE Access"},{"key":"2082_CR9","doi-asserted-by":"crossref","unstructured":"Chakrabarty P, Sarkar T, Rakhra M, Jairath K, Sharma V (2024) Enhanced data security framework using lightweight cryptography and multi-level encryption. In 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), Gautam Buddha Nagar, India. IEEE, pp 720\u2013725","DOI":"10.1109\/IC3SE62002.2024.10593191"},{"issue":"4","key":"2082_CR10","first-page":"285","volume":"47","author":"M Chande","year":"2021","unstructured":"Chande M (2021) Modified ElGamal signature with secret key pair and additional random number. Serdica Math J 47(4):285\u2013290","journal-title":"Serdica Math J"},{"key":"2082_CR11","doi-asserted-by":"publisher","first-page":"127584","DOI":"10.1016\/j.eswa.2025.127584","volume":"279","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Kumar NJ, Ponnuviji NP (2025) Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm. Expert Syst Appl 279:127584","journal-title":"Expert Syst Appl"},{"issue":"2","key":"2082_CR12","first-page":"635","volume":"19","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Prabaharan G, Valarmathi K, Sankar SU, Sugumar R (2025) Safeguarding privacy by utilizing SC-D\u2113DA algorithm in cloud-enabled multi party computation. KSII Trans Int Info Syst (TIIS) 19(2):635\u2013656","journal-title":"KSII Trans Int Info Syst (TIIS)"},{"key":"2082_CR13","first-page":"119","volume":"34","author":"K Benzina","year":"2019","unstructured":"Benzina K (2019) Cloud infrastructure-as-a-service as an essential facility: market structure, competition, and the need for industry and regulatory solutions. Berkeley Tech LJ 34:119","journal-title":"Berkeley Tech LJ"},{"issue":"3","key":"2082_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4364","volume":"31","author":"S Namasudra","year":"2019","unstructured":"Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency Comput Pract Exper 31(3):e4364","journal-title":"Concurrency Comput Pract Exper"},{"key":"2082_CR15","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210\u201342219","journal-title":"IEEE Access"},{"issue":"04","key":"2082_CR16","doi-asserted-by":"publisher","first-page":"2450060","DOI":"10.4015\/S1016237224500601","volume":"37","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Srinivasan L, Selvaraj D, Anish TP (2025) A novel privacy preservation of healthcare data with information entropy-based multi-scheme fully homomorphic encryption and rivest shamir adleman techniques. Biomed Eng Appl Basis Commun 37(04):2450060","journal-title":"Biomed Eng Appl Basis Commun"},{"issue":"3&4","key":"2082_CR17","first-page":"227","volume":"24","author":"D Dhinakaran","year":"2024","unstructured":"Dhinakaran D, Srinivasan L, Sankar SU, Selvaraj D (2024) Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things an extensive analysis. Quantum Inf Comput 24(3&4):227\u2013266","journal-title":"Quantum Inf Comput"},{"key":"2082_CR18","first-page":"16","volume":"3","author":"F Thabit","year":"2022","unstructured":"Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S (2022) A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing. Int J Intell Networks 3:16\u201330","journal-title":"Int J Intell Networks"},{"issue":"4","key":"2082_CR19","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1109\/COMST.2020.3020092","volume":"22","author":"DC Nguyen","year":"2020","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun Surv Tutor 22(4):2521\u20132549","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"2082_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","volume":"25","author":"J Lee","year":"2021","unstructured":"Lee J, Park K (2021) GAN-based imbalanced data intrusion detection system. Pers Ubiquit Comput 25(1):121\u2013128","journal-title":"Pers Ubiquit Comput"},{"key":"2082_CR21","unstructured":"Wu P (2020) Deep learning for network intrusion detection: attack recognition with computational intelligence. Doctoral dissertation, UNSW Sydney"},{"key":"2082_CR22","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder MA, Hasan KF, Islam MM, Uddin MA, Akhter A, Yousuf MA, Alharbi F, Moni MA (2023) A dependable hybrid machine learning model for network intrusion detection. J Inf Secur Appl 72:103405","journal-title":"J Inf Secur Appl"},{"key":"2082_CR23","doi-asserted-by":"publisher","first-page":"145785","DOI":"10.1109\/ACCESS.2021.3122938","volume":"9","author":"MU Sana","year":"2021","unstructured":"Sana MU, Li Z, Javaid F, Liaqat HB, Ali MU (2021) Enhanced security in cloud computing using neural network and encryption. IEEE Access 9:145785\u2013145799","journal-title":"IEEE Access"},{"issue":"17","key":"2082_CR24","doi-asserted-by":"publisher","first-page":"5841","DOI":"10.3390\/app10175841","volume":"10","author":"B Jang","year":"2020","unstructured":"Jang B, Kim M, Harerimana G, Kang SU, Kim JW (2020) Bi-LSTM model to increase accuracy in text classification: Combining Word2vec CNN and attention mechanism. Appl Sci 10(17):5841","journal-title":"Appl Sci"},{"issue":"4","key":"2082_CR25","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1007\/s11277-022-10063-y","volume":"128","author":"LK Vashishtha","year":"2023","unstructured":"Vashishtha LK, Singh AP, Chatterjee K (2023) HIDM: a hybrid intrusion detection model for cloud-based systems. Wireless Pers Commun 128(4):2637\u20132666","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"2082_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101938","volume":"36","author":"M Ouhssini","year":"2024","unstructured":"Ouhssini M, Afdel K, Agherrabi E, Akouhar M, Abarda A (2024) Deepdefend: a comprehensive framework for DDoS attack detection and prevention in cloud computing. J King Saud Univ Comput Inf Sci 36(2):101938","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"2082_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3351119","author":"MY Shakor","year":"2024","unstructured":"Shakor MY, Khaleel MI, Safran M, Alfarhood S, Zhu M (2024) Dynamic AES encryption and blockchain key management: a novel solution for cloud data security. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3351119","journal-title":"IEEE Access"},{"issue":"1","key":"2082_CR28","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.dcan.2022.10.004","volume":"9","author":"D Mishra","year":"2023","unstructured":"Mishra D, Naik B, Nayak J, Souri A, Dash PB, Vimal S (2023) Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network. Digit Commun Netw 9(1):125\u2013137","journal-title":"Digit Commun Netw"},{"key":"2082_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.103886","volume":"25","author":"A Roy","year":"2025","unstructured":"Roy A, Mahanta DR, Mahanta LB (2025) A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing. Results Eng 25:103886","journal-title":"Results Eng"},{"key":"2082_CR30","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9:57792\u201357807","journal-title":"IEEE Access"},{"issue":"8","key":"2082_CR31","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1080\/01969722.2022.2055403","volume":"53","author":"SX Pushpa","year":"2022","unstructured":"Pushpa SX, Raja SKS (2022) Enhanced ECC based authentication protocol in wireless sensor network with DoS mitigation. Cybern Syst 53(8):734\u2013755","journal-title":"Cybern Syst"},{"key":"2082_CR32","unstructured":"Saputra DCE, Sunat K, Ratnaningsih T (2024) SMOTE-MRS: a novel SMOTE-multiresolution sampling technique for imbalanced distribution to improve prediction of anemia. IEEE Access"},{"key":"2082_CR33","doi-asserted-by":"crossref","unstructured":"Rao BR, Sujatha B (2023) A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security. Meas Sensors 29:100870","DOI":"10.1016\/j.measen.2023.100870"},{"issue":"7","key":"2082_CR34","doi-asserted-by":"publisher","first-page":"5251","DOI":"10.1007\/s00521-022-07916-9","volume":"35","author":"EH Houssein","year":"2023","unstructured":"Houssein EH, Hosney ME, Mohamed WM, Ali AA, Younis EM (2023) Fuzzy-based hunger games search algorithm for global optimization and feature selection using medical data. Neural Comput Appl 35(7):5251\u20135275","journal-title":"Neural Comput Appl"},{"key":"2082_CR35","unstructured":"Chen Y, Kalantidis Y, Li J, Yan S, Feng J (2018) A^ 2-nets: Double attention networks. In: Bengio S, Wallach H, Larochelle H, Grauman K, Cesa-Bianchi N, Garnett R, (eds) Advances in Neural Information Processing Systems, vol 31. Curran Associates, Inc"},{"key":"2082_CR36","unstructured":"Zion GD, Tripathy BK, (2023) Pattern prediction on uncertain big datasets using combined light GBM and LSTM model. Int J Adv Soft Computing Appl 15(3)"},{"key":"2082_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3370470","author":"QD Truong","year":"2024","unstructured":"Truong QD, Duong PN, Lee H (2024) Efficient low-latency hardware architecture for module-lattice-based digital signature standard. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3370470","journal-title":"IEEE Access"},{"key":"2082_CR38","doi-asserted-by":"publisher","first-page":"118439","DOI":"10.1016\/j.eswa.2022.118439","volume":"210","author":"M Alazab","year":"2022","unstructured":"Alazab M, Khurma RA, Awajan A, Camacho D (2022) A new intrusion detection system based on Moth-Flame Optimizer algorithm. Expert Syst Appl 210:118439","journal-title":"Expert Syst Appl"},{"issue":"2","key":"2082_CR39","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s12293-016-0212-3","volume":"10","author":"GG Wang","year":"2018","unstructured":"Wang GG (2018) Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Memet Comput 10(2):151\u2013164","journal-title":"Memet Comput"},{"key":"2082_CR40","doi-asserted-by":"publisher","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Nhung-Nguyen H, Hussain J, Hwa-Kim Y (2023) A novel two-stage deep learning model for network intrusion detection: LSTM-AE. IEEE Access 11:37131\u201337148","journal-title":"IEEE Access"},{"issue":"1","key":"2082_CR41","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/21642583.2019.1708830","volume":"8","author":"J Xue","year":"2020","unstructured":"Xue J, Shen B (2020) A novel swarm intelligence optimization approach: sparrow search algorithm. Syst Sci Control Eng 8(1):22\u201334","journal-title":"Syst Sci Control Eng"},{"key":"2082_CR42","unstructured":"UNSW-NN15 dataset: https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset. Accessed Feb 2025"},{"key":"2082_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Mehfuz S (2024) Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Security and Applications 2:100027","journal-title":"Cyber Security and Applications"},{"key":"2082_CR44","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.aej.2022.10.056","volume":"64","author":"M Ali","year":"2023","unstructured":"Ali M, Jung LT, Sodhro AH, Laghari AA, Belhaouari SB, Gillani Z (2023) A confidentiality-based data classification-as-a-service (C2aaS) for cloud security. Alex Eng J 64:749\u2013760","journal-title":"Alex Eng J"},{"issue":"1","key":"2082_CR45","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1186\/s12874-024-02324-0","volume":"24","author":"A Altamimi","year":"2024","unstructured":"Altamimi A, Alarfaj AA, Umer M, Alabdulqader EA, Alsubai S, Kim TH, Ashraf I (2024) An automated approach to predict diabetic patients using KNN imputation and effective data mining techniques. BMC Med Res Methodol 24(1):221","journal-title":"BMC Med Res Methodol"},{"key":"2082_CR46","volume":"27","author":"H El-Sofany","year":"2024","unstructured":"El-Sofany H, El-Seoud SA, Karam OH, Bouallegue B, Ahmed AM (2024) A proposed secure framework for protecting cloud-based educational systems from hacking. Egypt Inf J 27:100505","journal-title":"Egypt Inf J"},{"key":"2082_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111519","volume":"157","author":"K Gupta","year":"2024","unstructured":"Gupta K, Saxena D, Gupta R, Kumar J, Singh AK (2024) FedMUP: federated learning driven malicious user prediction model for secure data distribution in cloud environments. Appl Soft Comput 157:111519","journal-title":"Appl Soft Comput"},{"issue":"2","key":"2082_CR48","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R (2023) Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage 31(2):33","journal-title":"J Netw Syst Manage"},{"key":"2082_CR49","doi-asserted-by":"crossref","unstructured":"Qin Z, Zhang P, Wu F, Li X (2021) Fcanet: Frequency channel attention networks. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 783\u2013792","DOI":"10.1109\/ICCV48922.2021.00082"},{"key":"2082_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2022.100612","volume":"25","author":"K Samunnisa","year":"2023","unstructured":"Samunnisa K, Kumar GSV, Madhavi K (2023) Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods. Meas Sensors 25:100612","journal-title":"Meas Sensors"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02082-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02082-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02082-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:10Z","timestamp":1760683150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02082-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2082"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02082-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"20 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval."}}],"article-number":"280"}}