{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:55:49Z","timestamp":1775181349171,"version":"3.50.1"},"reference-count":118,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133313","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:26:54Z","timestamp":1773250014000},"page":"133313","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["The double-edged sword: LLM operations (LLMOps) security in the cloud- a comprehensive review"],"prefix":"10.1016","volume":"680","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9141-8837","authenticated-orcid":false,"given":"Sijjad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Dhani Bux","family":"Talpur","sequence":"additional","affiliation":[]},{"given":"Mamoona","family":"Humayun","sequence":"additional","affiliation":[]},{"given":"Maraam Fahaad","family":"Almufareh","sequence":"additional","affiliation":[]},{"given":"Ghadah Naif","family":"Alwakid","sequence":"additional","affiliation":[]},{"given":"Jahanzaib","family":"Yaqoob","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.neucom.2026.133313_bib0005","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1007\/s10115-024-02310-4","article-title":"Large language models: a survey of their development, capabilities, and applications","volume":"67","author":"Annepaka","year":"2025","journal-title":"Knowl. Inf. Syst."},{"issue":"10","key":"10.1016\/j.neucom.2026.133313_bib0010","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/s10462-024-10888-y","article-title":"Large language models (LLMS): survey, technical frameworks, and future challenges","volume":"57","author":"Kumar","year":"2024","journal-title":"Artif. Intell. Rev."},{"issue":"2","key":"10.1016\/j.neucom.2026.133313_bib0015","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3390\/info16020087","article-title":"Transitioning from mlops to llmops: navigating the unique challenges of large language models","volume":"16","author":"Pahune","year":"2025","journal-title":"Information"},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0020","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MS.2024.3477014","article-title":"Mlops, llmops, fmops, and beyond","volume":"42","author":"Tantithamthavorn","year":"2025","journal-title":"IEEE Software"},{"key":"10.1016\/j.neucom.2026.133313_bib0025","series-title":"Mlops and Llmops: Development of an LLM-Based Application with Focus on Toxicity Evaluation and Scalable Cloud Deployment","author":"Nicora","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0030","first-page":"89","article-title":"Cloud computing infrastructure, platforms, and software for scientific research","author":"Mathur","year":"2024","journal-title":"High Perform. Comput. Biomimetics: Model. Archit. Appl."},{"key":"10.1016\/j.neucom.2026.133313_bib0035","doi-asserted-by":"crossref","first-page":"80543","DOI":"10.1109\/ACCESS.2023.3300658","article-title":"Opportunities, applications, and challenges of edge-ai enabled video analytics in smart cities: a systematic review","volume":"11","author":"Badidi","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133313_bib0040","series-title":"Designing Scalable and Intelligent Cloud Architectures: an End-to-End Guide to AI Driven Platforms, MLOps Pipelines, and Data Engineering for Digital Transformation","author":"Lakkarasu","year":"2025"},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0045","first-page":"104","article-title":"Agent-based approach to implementing artificial intelligence (AI) in service-oriented architecture (soa)","author":"Petrenko","year":"2025","journal-title":"Syst. Res. Inf. Technol."},{"key":"10.1016\/j.neucom.2026.133313_bib0050","series-title":"Cloud Innovation: Scaling with Vectors and LLMs","author":"Bhattacharyya","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0055","unstructured":"P. Lakkarasu, Building Cloud-Native AI and MLOps Platforms for Scalable, Secure, and Mission-Critical Intelligence Systems, Aqua Publications. https:\/\/books.google.com.hk\/books?hl=en&lr=&id=825eEQAAQBAJ&oi=fnd&pg=PA1&dq=P.+Lakkarasu,+Building+Cloud-Native+AI+and+MLOps+Platforms+for+Scalable,+Secure,+and+Mission-Critical+Intelligence+Systems,+AQUA+PUBLICATIONS&ots=xs575d3tXM&sig=bFCejWf926EQZC50-hn0MBTeCHU&redir_esc=y#v=onepage&q=P.%20Lakkarasu%2C%20Building%20Cloud-Native%20AI%20and%20MLOps%20Platforms%20for%20Scalable%2C%20Secure%2C%20and%20Mission-Critical%20Intelligence%20Systems%2C%20AQUA%20PUBLICATIONS&f=false"},{"key":"10.1016\/j.neucom.2026.133313_bib0060","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104599","article-title":"Security and privacy in multi-cloud and hybrid cloud environments: challenges, strategies, and future directions","author":"Ali","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2026.133313_bib0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110649","article-title":"Next-generation quantum security: the impact of quantum computing on cybersecurity\u2014threats, mitigations, and solutions","volume":"128","author":"Ali","year":"2025","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.neucom.2026.133313_bib0070","series-title":"A Systems Analysis of Insider Data Exfiltration: A Decentralized Framework for Disincentivizing and Auditing Data Exfiltration","author":"Essilfie-Conduah","year":"2019"},{"key":"10.1016\/j.neucom.2026.133313_bib0075","author":"Tallam"},{"key":"10.1016\/j.neucom.2026.133313_bib0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103222","article-title":"Cldm-mmnns: cross-layer defense mechanisms through multi-modal neural networks fusion for end-to-end cybersecurity\u2014issues, challenges, and future directions","volume":"122","author":"Ali","year":"2025","journal-title":"Inf. Fusion."},{"key":"10.1016\/j.neucom.2026.133313_bib0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102922","article-title":"Ai-driven fusion with cybersecurity: exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms\u2013a comprehensive review","author":"Ali","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.neucom.2026.133313_bib0090","author":"Nong"},{"key":"10.1016\/j.neucom.2026.133313_bib0095","series-title":"The Application of Agile to Large-Scale, Safety-Critical, Cyber-Physical Systems","author":"Yeman","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0100","series-title":"Adversarial machine learning and generative artificial intelligence: trust and transparency challenges in large language model deployment","author":"Rane","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0105","author":"Li"},{"issue":"6","key":"10.1016\/j.neucom.2026.133313_bib0110","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3712001","article-title":"Security and privacy challenges of large language models: a survey","volume":"57","author":"Das","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133313_bib0115","author":"Chen"},{"key":"10.1016\/j.neucom.2026.133313_bib0120","series-title":"Systematic Technical Survey on Llmops: Lifecycle, Tools, Challenges, and Emerging Practices","author":"\u00d6zer","year":"2025"},{"issue":"32","key":"10.1016\/j.neucom.2026.133313_bib0125","first-page":"66","article-title":"The evolution of LLMOps: latest trends and developments","volume":"13","author":"Madicharla","year":"2025","journal-title":"Eur. J. Comput. Sci. Inf. Technol."},{"key":"10.1016\/j.neucom.2026.133313_bib0130","series-title":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining v. 2","first-page":"6216","article-title":"A survey on trustworthy LLM agents: threats and countermeasures","author":"Yu","year":"2025"},{"issue":"2","key":"10.1016\/j.neucom.2026.133313_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100211","article-title":"A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly","volume":"4","author":"Yao","year":"2024","journal-title":"High-Confid. Comput."},{"key":"10.1016\/j.neucom.2026.133313_bib0140","author":"Xu"},{"key":"10.1016\/j.neucom.2026.133313_bib0145","author":"Xu"},{"key":"10.1016\/j.neucom.2026.133313_bib0150","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3505983","article-title":"Application of large language models in cybersecurity: a systematic literature review","volume":"12","author":"Hasanov","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133313_bib0155","author":"Gong"},{"key":"10.1016\/j.neucom.2026.133313_bib0160","author":"Liu"},{"key":"10.1016\/j.neucom.2026.133313_bib0165","author":"Patil"},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0170","first-page":"057","article-title":"Large language models (LLMS) for cybersecurity: a systematic review","volume":"13","author":"Yazi","year":"2024","journal-title":"WORLD"},{"key":"10.1016\/j.neucom.2026.133313_bib0175","author":"Habibzadeh"},{"issue":"8","key":"10.1016\/j.neucom.2026.133313_bib0180","doi-asserted-by":"crossref","first-page":"2350","DOI":"10.3390\/s25082350","article-title":"A comprehensive survey of privacy-enhancing and trust-centric cloud-native security techniques against cyber threats","volume":"25","author":"Arif","year":"2025","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.neucom.2026.133313_bib0185","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3390\/info16050365","article-title":"Toward robust security orchestration and automated response in security operations centers with a hyper-automation approach using agentic artificial intelligence","volume":"16","author":"Kurnia","year":"2025","journal-title":"Information"},{"issue":"2","key":"10.1016\/j.neucom.2026.133313_bib0190","doi-asserted-by":"crossref","first-page":"25","DOI":"10.54660\/IJFEI.2024.1.2.25-47","article-title":"A conceptual framework for ci\/cd pipeline security controls in hybrid application deployments","volume":"1","author":"Obuse","year":"2024","journal-title":"Int. J. Future Eng. Innov."},{"key":"10.1016\/j.neucom.2026.133313_bib0195","series-title":"Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0","first-page":"39","article-title":"Cloud computing security framework based on shared responsibility models: cloud computing","author":"Singh","year":"2021"},{"key":"10.1016\/j.neucom.2026.133313_bib0200","article-title":"Managing the risks of data security and privacy in the cloud: a shared responsibility between the cloud service provider and the client organisation","author":"Lane","year":"2017","journal-title":"Bright Internet Global Summit 2017"},{"issue":"6","key":"10.1016\/j.neucom.2026.133313_bib0205","first-page":"635","article-title":"An effective cloud computing model enhancing privacy in cloud computing","volume":"33","author":"Chawki","year":"2024","journal-title":"Inf. Secur. J.: A Glob. Perspect."},{"key":"10.1016\/j.neucom.2026.133313_bib0210","author":"Zhang"},{"key":"10.1016\/j.neucom.2026.133313_bib0215","author":"Shayegani"},{"key":"10.1016\/j.neucom.2026.133313_bib0220","series-title":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining v. 2","first-page":"6227","article-title":"A survey on model extraction attacks and defenses for large language models","author":"Zhao","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0225","author":"Arzanipour"},{"key":"10.1016\/j.neucom.2026.133313_bib0230","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"1831","article-title":"Formalizing and benchmarking prompt injection attacks and defenses","author":"Liu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0235","author":"Bai"},{"issue":"10.1145","key":"10.1016\/j.neucom.2026.133313_bib0240","first-page":"2487726","article-title":"Using innovative instructions to create trustworthy software solutions","volume":"11","author":"Hoekstra","year":"2013","journal-title":"HASP@ ISCA"},{"key":"10.1016\/j.neucom.2026.133313_bib0245","series-title":"Adversarial Prompt Transformation for Systematic Jailbreaks of LLMS","author":"Awoufack","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0250","author":"Peng"},{"issue":"5","key":"10.1016\/j.neucom.2026.133313_bib0255","doi-asserted-by":"crossref","first-page":"202","DOI":"10.3390\/technologies13050202","article-title":"A comprehensive review of adversarial attacks and defense strategies in deep neural networks","volume":"13","author":"Abomakhelb","year":"2025","journal-title":"Technologies"},{"key":"10.1016\/j.neucom.2026.133313_bib0260","article-title":"Denial of wallet\u2014defining a looming threat to serverless computing","volume":"60","author":"Kelly","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.neucom.2026.133313_bib0265","series-title":"Distributed security enhancement from a data management perspective: theoretical foundations and practical applications","author":"Fu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0270","series-title":"Encrypted Query Processing in Duckdb","author":"Ansmink","year":"2021"},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0275","doi-asserted-by":"crossref","first-page":"3338","DOI":"10.1038\/s41598-025-87454-1","article-title":"Privacy-preserving approach for IOT networks using statistical learning with optimization algorithm on high-dimensional big data environment","volume":"15","author":"Alrayes","year":"2025","journal-title":"Scientific Rep."},{"key":"10.1016\/j.neucom.2026.133313_bib0280","author":"Ni"},{"key":"10.1016\/j.neucom.2026.133313_bib0285","series-title":"The role of transformer models in cloud AI services","author":"Olaoye","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0290","author":"Wang"},{"issue":"9","key":"10.1016\/j.neucom.2026.133313_bib0295","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3559104","article-title":"Evaluating the cybersecurity risk of real-world, machine learning production systems","volume":"55","author":"Bitton","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133313_bib0300","series-title":"Vectorizing the Cloud: Advanced RAG Solutions","author":"Bairi","year":"2024"},{"issue":"3","key":"10.1016\/j.neucom.2026.133313_bib0305","first-page":"85","article-title":"Secure software supply chains: managing dependencies in an ai-augmented dev world","volume":"4","author":"Rusum","year":"2023","journal-title":"Int. J. Artif. Intell. Data Sci. Mach. Learn."},{"issue":"4","key":"10.1016\/j.neucom.2026.133313_bib0310","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/3582302.3582306","article-title":"Management of machine learning lifecycle artifacts: a survey","volume":"51","author":"Schlegel","year":"2023","journal-title":"ACM SIGMOD Record"},{"key":"10.1016\/j.neucom.2026.133313_bib0315","series-title":"State of the Art Practices for Machine Learning Operations in Google Cloud","author":"Cruz L\u00f3pez la","year":"2023"},{"key":"10.1016\/j.neucom.2026.133313_bib0320","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1421","article-title":"Data breaches, phishing, or malware? Understanding the risks of stolen credentials","author":"Thomas","year":"2017"},{"issue":"6","key":"10.1016\/j.neucom.2026.133313_bib0325","doi-asserted-by":"crossref","DOI":"10.1109\/TC.2025.3547158","article-title":"Optimizing serverless performance through game theory and efficient resource scheduling","volume":"74","author":"Wang","year":"2025","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.neucom.2026.133313_bib0330","doi-asserted-by":"crossref","first-page":"42919","DOI":"10.1109\/ACCESS.2021.3066289","article-title":"Sbi model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique","volume":"9","author":"Mohamed","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133313_bib0335","author":"Wang"},{"key":"10.1016\/j.neucom.2026.133313_bib0340","author":"Abbasi"},{"key":"10.1016\/j.neucom.2026.133313_bib0345","author":"Shivashankar"},{"key":"10.1016\/j.neucom.2026.133313_bib0350","series-title":"Infrastructure as Code for Cybersecurity Training","author":"Pinto","year":"2023"},{"key":"10.1016\/j.neucom.2026.133313_bib0355","series-title":"Designing zero trust security models to protect distributed networks and minimize cyber risks","author":"Dalal","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0360","series-title":"A survey on model context protocol: architecture, state-of-the-art, challenges and future directions","author":"Ray","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0365","author":"Patel"},{"key":"10.1016\/j.neucom.2026.133313_bib0370","series-title":"CI\/CD Design Patterns: Design and Implement CI\/CD Using Proven Design Patterns","author":"Bajpai","year":"2024"},{"issue":"2","key":"10.1016\/j.neucom.2026.133313_bib0375","doi-asserted-by":"crossref","first-page":"53","DOI":"10.30996\/jitcs.9715","article-title":"Navigating the cyber threat landscape: a comprehensive analysis of attacks and security in the digital age","volume":"1","author":"Jony","year":"2023","journal-title":"J. Inf. Technol. Cyber Secur."},{"issue":"4","key":"10.1016\/j.neucom.2026.133313_bib0380","first-page":"574","article-title":"Identity and access management in cloud environment: mechanisms and challenges","volume":"21","author":"Indu","year":"2018","journal-title":"Eng. Sci. Technol. Int. J."},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0385","first-page":"129","article-title":"Cyber security vulnerabilities and remediation through cloud security tools","volume":"2","author":"Jimmy","year":"2024","journal-title":"J. Artif. Intell. Gen. Sci."},{"key":"10.1016\/j.neucom.2026.133313_bib0390","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ins.2013.03.022","article-title":"Adversarial attacks against intrusion detection systems: taxonomy, solutions and open issues","volume":"239","author":"Corona","year":"2013","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.neucom.2026.133313_bib0395","first-page":"1153","article-title":"Least privilege across people, process, and technology: endpoint security framework","volume":"63","author":"Plachkinova","year":"2023","journal-title":"J. Comput. Inf. Syst."},{"key":"10.1016\/j.neucom.2026.133313_bib0400","series-title":"Multi-Cloud Strategy for Cloud Architects: Learn How to Adopt and Manage Public Clouds by Leveraging BaseOps, FinOps, and DevSecOps","author":"Mulder","year":"2023"},{"issue":"4","key":"10.1016\/j.neucom.2026.133313_bib0405","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1109\/COMST.2016.2556979","article-title":"A survey of network isolation solutions for multi-tenant data centers","volume":"18","author":"Del Piccolo","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.neucom.2026.133313_bib0410","series-title":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","first-page":"129","article-title":"Cross-tenant trust models in cloud computing","author":"Tang","year":"2013"},{"key":"10.1016\/j.neucom.2026.133313_bib0415","series-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security","first-page":"195","article-title":"Weak leakage-resilient client-side deduplication of encrypted data in cloud storage","author":"Xu","year":"2013"},{"key":"10.1016\/j.neucom.2026.133313_bib0420","series-title":"Enhancing cloud security with AI: a deep learning approach to identify and prevent cyberattacks in multi-tenant environments","author":"Guntupalli","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0425","series-title":"2025 International Conference on Computing Technologies & Data Communication (ICCTDC)","first-page":"1","article-title":"Security and privacy challenges in multi-tenant cloud architectures: a comprehensive analysis","author":"Kumar","year":"2025"},{"issue":"4","key":"10.1016\/j.neucom.2026.133313_bib0430","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.32996\/jcsts.2025.7.4.122","article-title":"Enterprise data integration: a case study analysis of multi-tenant platforms enabling cross-domain analytics","volume":"7","author":"Narlawar","year":"2025","journal-title":"J. Comput. Sci. Technol. Stud."},{"issue":"3","key":"10.1016\/j.neucom.2026.133313_bib0435","first-page":"1","article-title":"Assessing the security implications of cloud migration: a risk analysis framework for protecting sensitive data in multi-tenant environments","volume":"15","author":"Sharma","year":"2025","journal-title":"Adv. Theor. Comput, Algorithmic Found, Emerg. Parad."},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0440","first-page":"1","article-title":"Multi-cloud strategies for managing big data workflows and AI applications in decentralized government systems","volume":"9","author":"Putri","year":"2025","journal-title":"J. Comput. Intell. Hybrid Cloud Edge Comput. Netw."},{"key":"10.1016\/j.neucom.2026.133313_bib0445","first-page":"307","article-title":"Securing artificial intelligence systems in the era of large language models","author":"Stefanita","year":"2025","journal-title":"Adv. Artif. Intell. Appl. Ind. Syst. Eng."},{"issue":"2","key":"10.1016\/j.neucom.2026.133313_bib0450","doi-asserted-by":"crossref","DOI":"10.1145\/3746635","article-title":"A survey of aiops in the era of large language models","volume":"58","author":"Zhang","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133313_bib0455","author":"Singhal"},{"key":"10.1016\/j.neucom.2026.133313_bib0460","series-title":"Secure pipelines, smarter AI: llm-powered data engineering for threat detection and compliance","author":"Bollikonda","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0465","article-title":"Threat modeling ai\/ml with the attack tree","volume":"12","author":"veria Hoseini","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133313_bib0470","series-title":"Analyzing Computer Security: A Threat\/Vulnerability\/Countermeasure Approach","author":"Pfleeger","year":"2012"},{"key":"10.1016\/j.neucom.2026.133313_bib0475","series-title":"Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering","first-page":"662","article-title":"Mlops-enabled security strategies for next-generation operational technologies","author":"Ahmad","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0480","series-title":"Essential Guide to LLMOps: Implementing Effective LLMOps Strategies and Tools from Data to Deployment","author":"Doan","year":"2024"},{"key":"10.1016\/j.neucom.2026.133313_bib0485","series-title":"Proceedings of the 33rd International Conference on Software Engineering","first-page":"251","article-title":"Patching vulnerabilities with sanitization synthesis","author":"Yu","year":"2011"},{"key":"10.1016\/j.neucom.2026.133313_bib0490","series-title":"Handbook of AI-Driven Threat Detection and Prevention","first-page":"95","article-title":"Behavioral analysis for threat detection","author":"Subrahmanyam","year":"2025"},{"key":"10.1016\/j.neucom.2026.133313_bib0495","first-page":"2","article-title":"Machine learning-powered anomaly detection: enhancing data security and integrity","volume":"184","author":"Devineni","year":"2023","journal-title":"J. Artif. Intell. Cloud Comput."},{"issue":"8","key":"10.1016\/j.neucom.2026.133313_bib0500","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.3390\/electronics14081645","article-title":"Multi-scale feature fusion-based real-time anomaly detection in industrial control systems","volume":"14","author":"Xu","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.neucom.2026.133313_bib0505","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","article-title":"Intelligent mobile malware detection using permission requests and API calls","volume":"107","author":"Alazab","year":"2020","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0510","doi-asserted-by":"crossref","first-page":"8","DOI":"10.3390\/fi17010008","article-title":"Gensqli: a generative artificial intelligence framework for automatically securing web application firewalls against structured query language injection attacks","volume":"17","author":"Babaey","year":"2024","journal-title":"Future Internet"},{"key":"10.1016\/j.neucom.2026.133313_bib0515","author":"Moia"},{"key":"10.1016\/j.neucom.2026.133313_bib0520","series-title":"Data Governance: A Guide","first-page":"217","article-title":"Data security and privacy: protecting sensitive information","author":"Sargiotis","year":"2024"},{"issue":"6","key":"10.1016\/j.neucom.2026.133313_bib0525","first-page":"1462","article-title":"Data at rest, data at risk: evaluating encryption and access control mechanisms in cloud storage systems","volume":"3","author":"Tanya","year":"2019","journal-title":"Int. J. Trend Sci. Res. Dev."},{"key":"10.1016\/j.neucom.2026.133313_bib0530","series-title":"Analyzing best practices and strategies for encrypting data at rest (stored) and data in transit (transmitted) in cloud environments","author":"Arora","year":"2025"},{"issue":"21\u201322","key":"10.1016\/j.neucom.2026.133313_bib0535","article-title":"Protecting data in the cloud: a systematic literature review of key management","volume":"37","author":"Ahmad","year":"2025","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"10.1016\/j.neucom.2026.133313_bib0540","series-title":"The 25th Annual International Conference on Mobile Computing and Networking","first-page":"1","article-title":"Occlumency: privacy-preserving remote deep-learning inference using sgx","author":"Lee","year":"2019"},{"issue":"3","key":"10.1016\/j.neucom.2026.133313_bib0545","first-page":"64","article-title":"Data privacy & encryption practices in cloud-based guidewire deployments","volume":"2","author":"Enjam","year":"2021","journal-title":"Int. J. AI, BigData, Comput. Manag. Stud."},{"key":"10.1016\/j.neucom.2026.133313_bib0550","series-title":"2024 IEEE Cloud Summit","first-page":"143","article-title":"Enterprise llmops: advancing large language models operations practice","author":"Shan","year":"2024"},{"issue":"8","key":"10.1016\/j.neucom.2026.133313_bib0555","article-title":"Data governance and compliance in cloud-based data engineering pipelines","volume":"5","author":"Pashikanti","year":"2024","journal-title":"Int. J. Lead. Res. Publ."},{"issue":"4","key":"10.1016\/j.neucom.2026.133313_bib0560","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.51219\/JAIMLD\/raj-vayyavur\/258","article-title":"Effective application security governance with role provisioning and least privileged access management","volume":"1","author":"Vayyavur","year":"2023","journal-title":"J. Artif. Intell. Mach. Learn. & Data Sci."},{"key":"10.1016\/j.neucom.2026.133313_bib0565","author":"Lin"},{"issue":"8","key":"10.1016\/j.neucom.2026.133313_bib0570","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1002\/asi.24311","article-title":"How integration of cyber security management and incident response enables organizational learning","volume":"71","author":"Ahmad","year":"2020","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"10.1016\/j.neucom.2026.133313_bib0575","series-title":"Industrial Internet of Things Security","first-page":"81","article-title":"Navigating compliance for the industrial IOT landscape: frameworks, security, standards, and key ethical considerations","author":"Shahi","year":"2024"},{"issue":"1","key":"10.1016\/j.neucom.2026.133313_bib0580","doi-asserted-by":"crossref","first-page":"54","DOI":"10.3390\/info17010054","article-title":"Prompt injection attacks in large language models and AI agent systems: a comprehensive review of vulnerabilities, attack vectors, and defense mechanisms","volume":"17","author":"Gulyamov","year":"2026","journal-title":"Information"},{"key":"10.1016\/j.neucom.2026.133313_bib0585","author":"Li"},{"key":"10.1016\/j.neucom.2026.133313_bib0590","author":"Baradwaj"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007101?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007101?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:18:24Z","timestamp":1775179104000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226007101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":118,"alternative-id":["S0925231226007101"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133313","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The double-edged sword: LLM operations (LLMOps) security in the cloud- a comprehensive review","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133313","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133313"}}