{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:25:34Z","timestamp":1774621534157,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":32,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00860-2","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T04:25:30Z","timestamp":1771820730000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial intelligence methods for enhancing cybersecurity in Oman: a comprehensive review"],"prefix":"10.1186","volume":"15","author":[{"given":"Almoatasem A. H.","family":"Alnaabi","sequence":"first","affiliation":[]},{"given":"Ali A. H.","family":"Al Mahruqi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,23]]},"reference":[{"key":"860_CR1","unstructured":"Schwab K (2016) The fourth industrial revolution. InWorld Econ Forum 16"},{"key":"860_CR2","unstructured":"ENSIA. Oman cybersecurity landscape report 2023. ENSIA reports. 2023"},{"key":"860_CR3","unstructured":"Oman Vision (2040) Implementation follow-up unit, Oman Vision 2040 progress report, Muscat. 2020"},{"key":"860_CR4","unstructured":"CyberLand Oman Cyber threat landscape 2024, CyberLand security bulletin. 2024"},{"key":"860_CR5","unstructured":"Cloudflare (2024) DDoS attack trends 2024. Cloudflare Intel Rep"},{"key":"860_CR6","doi-asserted-by":"crossref","unstructured":"Younan M, Elhoseny M, Ali AA, Houssein EH (2021) Quantum chain of things (qcot): a new paradigm for integrating quantum computing, blockchain, and internet of things. In 2021 17th International Computer Engineering Conference (ICENCO), IEEE 101\u2013106","DOI":"10.1109\/ICENCO49852.2021.9698947"},{"key":"860_CR7","doi-asserted-by":"crossref","unstructured":"Younan M, Houssein EH, Elhoseny M, Ali AA (2020) Improved models for time series cluster representation based dynamic time warping. In 2020 15th International Conference on Computer Engineering and Systems (ICCES), IEEE 1\u20136","DOI":"10.1109\/ICCES51560.2020.9334608"},{"key":"860_CR8","doi-asserted-by":"publisher","first-page":"107198","DOI":"10.1016\/j.measurement.2019.107198","volume":"151","author":"M Younan","year":"2020","unstructured":"Younan M, Houssein EH, Elhoseny M, Ali AA (2020) Challenges and recommended technologies for the industrial internet of things: a comprehensive review. Measurement 151:107198","journal-title":"Measurement"},{"key":"860_CR9","unstructured":"SonicWall (2024) Cyber threat report 2024. SonicWall Threat Labs"},{"key":"860_CR10","unstructured":"Forrester (2023) Zero trust adoption and effectiveness in 2024. Forrester Consulting Study"},{"key":"860_CR11","unstructured":"The Cyber Express, Oman\u2019s National Cybersecurity Centre launches CREST CAMP initiative, The Cyber Express. (2024)"},{"key":"860_CR12","unstructured":"ITU (2023) Global cybersecurity index 2023. International Telecommunication Union reports"},{"key":"860_CR13","unstructured":"CYSEC Oman (2025) Cybersecurity market forecast 2025, CYSEC Oman Annual Review"},{"key":"860_CR14","unstructured":"Neuberger A (2023) Global Cybercrime costs forecast to 2027. Cybersecur Ventures"},{"key":"860_CR15","unstructured":"Harris S, Liu J, Ta VT, Hadi HJ, Khan A, Zukaib U Cybersecurity standards for AI based healthcare networks. 2024"},{"issue":"2","key":"860_CR16","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"B Buczak","year":"2016","unstructured":"Buczak B, Guven E (2016) A survey of data mining and machine learning methods for Cyber security intrusion detection. IEEE Commun Surv Tutorials 18(2):1153\u20131176","journal-title":"IEEE Commun Surv Tutorials"},{"key":"860_CR17","unstructured":"Point C (2024) MuddyWater targets middle Eastern governments with phishing campaign. Check Point Res Rep"},{"issue":"3","key":"860_CR18","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):58. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv"},{"issue":"4","key":"860_CR19","first-page":"215","volume":"8","author":"S Ofusori","year":"2024","unstructured":"Ofusori S, Roshanaei H, Mahfuri T (2024) Applications of artificial intelligence in cybersecurity: a systematic Review. J Inf Secur Res 8(4):215\u2013239","journal-title":"J Inf Secur Res"},{"issue":"3","key":"860_CR20","first-page":"33","volume":"6","author":"H Mahfuri","year":"2024","unstructured":"Mahfuri H, Jada R, Mayayise L (2024) Machine learning approaches for Cyber threat detection in developing nations. Int J Cyber Stud 6(3):33\u201358","journal-title":"Int J Cyber Stud"},{"key":"860_CR21","first-page":"103","volume":"136","author":"H Roshanaei","year":"2024","unstructured":"Roshanaei H (2024) Dual-use nature of AI in cybersecurity: a comprehensive analysis. Comput Secur 136:103\u2013128","journal-title":"Comput Secur"},{"issue":"2","key":"860_CR22","first-page":"45","volume":"11","author":"A Alshammari","year":"2023","unstructured":"Alshammari A, Alwan M (2023) AI-driven decision-making in national cybersecurity. Saudi J Cyber Res 11(2):45\u201360","journal-title":"Saudi J Cyber Res"},{"issue":"2","key":"860_CR23","first-page":"45","volume":"13","author":"A Jada","year":"2024","unstructured":"Jada A, Mayayise T (2024) Challenges of AI integration in cybersecurity for emerging economies. Afr J Inf Syst 13(2):45\u201359","journal-title":"Afr J Inf Syst"},{"key":"860_CR24","unstructured":"Oman ITA Oman Information Technology authority Annual report, Muscat. 2017"},{"issue":"1","key":"860_CR25","first-page":"54","volume":"12","author":"M Rizvi","year":"2023","unstructured":"Rizvi M (2023) Artificial intelligence investment and its cost implications for SMEs. J Digit Econ 12(1):54\u201366","journal-title":"J Digit Econ"},{"key":"860_CR26","first-page":"20451","volume":"9","author":"X Li","year":"2021","unstructured":"Li X, Liu Y (2021) Cybersecurity and artificial intelligence integration: a systematic review. IEEE Access 9:20451\u201320470","journal-title":"IEEE Access"},{"issue":"2","key":"860_CR27","first-page":"10","volume":"5","author":"AA Mahruqi","year":"2022","unstructured":"Mahruqi AA (2022) Growth and future trends of the cybersecurity industry in Oman. Middle East Cybersecur J 5(2):10\u201325","journal-title":"Middle East Cybersecur J"},{"key":"860_CR28","first-page":"1258","volume":"167","author":"R Bhatele","year":"2019","unstructured":"Bhatele R et al. (2019) Anomaly detection in network security using machine learning. Procedia Comput Sci 167:1258\u20131267","journal-title":"Procedia Comput Sci"},{"key":"860_CR29","unstructured":"MTCIT (2023) Ministry of Transport, Communications, and Information Technology: executive program for AI and advanced technologies: cybersecurity integration. https:\/\/www.mtcit.gov.om\/ai-program-2023\/"},{"key":"860_CR30","unstructured":"MTCIT (2024) Ministry of Transport, Communications, and Information Technology: vision, 2040: cybersecurity as a pillar of digital transformation. https:\/\/www.mtcit.gov.om\/vision-2040-cybersecurity\/"},{"key":"860_CR31","unstructured":"MTCIT (2021) Ministry of Transport, Communications, and Information Technology: new Omani government policy on the use of artificial intelligence. https:\/\/opendata.om\/2021\/new-omani-government-policy-on-the-use-of-artificial-intelligence\/"},{"key":"860_CR32","first-page":"5163","volume":"7","author":"A Alom","year":"2019","unstructured":"Alom A, Taha T, Yakopcic C (2019) A state-of-the-art survey on deep learning in cybersecurity. IEEE Access 7:5163\u20135185","journal-title":"IEEE Access"},{"key":"860_CR33","doi-asserted-by":"publisher","first-page":"96892","DOI":"10.1109\/ACCESS.2023.3294111","volume":"11","author":"Y Abadade","year":"2023","unstructured":"Abadade Y, Temouden A, Bamoumen H, Benamar N, Chtouki Y, Hafid AS (2023) A comprehensive survey on tinyml. IEEE Access 11:96892\u201396922","journal-title":"IEEE Access"},{"issue":"3","key":"860_CR34","first-page":"112","volume":"2","author":"M Aldhamer","year":"2023","unstructured":"Aldhamer M (2023) Explainable artificial intelligence and audit transparency in regulated industries. AI Governance J 2(3):112\u2013127","journal-title":"AI Governance J"},{"key":"860_CR35","unstructured":"Qatar computing research Institute, (2024) Advances in Arabic Natural language processing for cybersecurity. QCRI technical reports"},{"key":"860_CR36","unstructured":"Park OD (2025) Cybersecurity and AI readiness report. Muscat"},{"key":"860_CR37","unstructured":"World Bank (2023) AI readiness index in the middle East 2023. World Bank Publications"},{"issue":"4","key":"860_CR38","first-page":"29","volume":"3","author":"A Alhakami","year":"2024","unstructured":"Alhakami A (2024) AI for cybersecurity development in Saudi Arabia. Saudi Digit Transform Rev 3(4):29\u201341","journal-title":"Saudi Digit Transform Rev"},{"key":"860_CR39","unstructured":"Talent G (2023) AI workforce and skills gap in the GCC. Gulf Talent Ind Report"},{"key":"860_CR40","unstructured":"Dubai S (2023) AI and Cybersecurity readiness report. Smart Dubai Office"},{"issue":"2","key":"860_CR41","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/jcp3020045","volume":"3","author":"AM Al-Khouri","year":"2023","unstructured":"Al-Khouri AM (2023) Balancing security and privacy in AI-driven cybersecurity: cultural considerations in Oman. J Cybersecur Privacy 3(2):45\u201360. https:\/\/doi.org\/10.3390\/jcp3020045","journal-title":"J Cybersecur Privacy"},{"key":"860_CR42","unstructured":"McKinsey (2023) AI policies and tax incentives in the GCC. McKinsey insights report"},{"issue":"2","key":"860_CR43","first-page":"33","volume":"4","author":"A Al-Saidi","year":"2023","unstructured":"Al-Saidi A (2023) Adoption of AI in Omani institutions: a mixed-methods study. Oman J Digit Innov 4(2):33\u201348","journal-title":"Oman J Digit Innov"},{"key":"860_CR44","unstructured":"Rogers EM, Singhal A, Quinlan MM (2014) Diffusion of innovations. In an integrated approach to communication theory and research. Routledge 432\u2013448"},{"issue":"2","key":"860_CR45","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1177\/1468794112468475","volume":"15","author":"R Berger","year":"2015","unstructured":"Berger R (2015) Now I see it, now I don\u2019t: researcher\u2019s position and reflexivity in qualitative research. Qualitative Res 15(2):219\u2013234. https:\/\/doi.org\/10.1177\/1468794112468475","journal-title":"Qualitative Res"},{"key":"860_CR46","unstructured":"Creswell JW, Clark VLP (2018) Designing and conducting mixed methods research, 3rd edn. Sage, Thousand Oaks, CA"},{"issue":"1","key":"860_CR47","doi-asserted-by":"publisher","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","volume":"37","author":"V Venkatesh","year":"2013","unstructured":"Venkatesh V, Brown SA, Bala H (2013) Bridging qualitative and quantitative methods in Information systems research. Mis Q 37(1):21\u201354","journal-title":"Mis Q"},{"issue":"1","key":"860_CR48","first-page":"76","volume":"9","author":"A Al-Azri","year":"2022","unstructured":"Al-Azri A (2022) Governmental bureaucracy and E-integration challenges in Oman. Oman Policy Rev 9(1):76\u201389","journal-title":"Oman Policy Rev"},{"key":"860_CR49","unstructured":"Cert ON (2023) Cyber threat report 2023. Muscat"},{"key":"860_CR50","doi-asserted-by":"crossref","unstructured":"Lincoln YS (1985) Naturalistic inquiry. sage 75","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"860_CR51","unstructured":"Times News Service (2025) Public sector AI in cyber defense. Times Oman"},{"issue":"5","key":"860_CR52","doi-asserted-by":"publisher","first-page":"40","DOI":"10.14445\/23497157\/IJRES-V11I5P105","volume":"11","author":"AS Al Kalbani","year":"2024","unstructured":"Al Kalbani AS, Al Kalbani HR (2024) Enhancing cybersecurity in logistics networks in Oman. SSRG Int J Recent Eng Sci 11(5):40\u201350. https:\/\/doi.org\/10.14445\/23497157\/IJRES-V11I5P105","journal-title":"SSRG Int J Recent Eng Sci"},{"key":"860_CR53","unstructured":"Capgemini Reinventing cybersecurity with artificial intelligence: the new frontier in digital security, Capgemini research Institute. 2019"},{"issue":"1","key":"860_CR54","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3233\/JCS-230045","volume":"32","author":"C Okeke","year":"2024","unstructured":"Okeke C (2024) Machine learning for network intrusion detection systems: a comparative analysis of algorithms. J Comput Secur 32(1):45\u201367. https:\/\/doi.org\/10.3233\/JCS-230045","journal-title":"J Comput Secur"},{"key":"860_CR55","unstructured":"ENISA (2024) European Union agency for cybersecurity: 2024 report on the state of the cybersecurity in the Union. https:\/\/www.enisa.europa.eu\/publications\/2024-report-on-the-state-of-the-cybersecurity-in-the-union"},{"key":"860_CR56","unstructured":"Kaspersky Kaspersky reports phishing attacks grow by 40 percent in 2023. 2024"},{"issue":"2","key":"860_CR57","first-page":"81","volume":"15","author":"Harris","year":"2024","unstructured":"Harris et al. (2024) Data breach trends in the education and health sectors. J Cybersecur Stud 15(2):81\u201394","journal-title":"J Cybersecur Stud"},{"key":"860_CR58","unstructured":"Muscat B (2024) Cybersecurity annual report 2024. Muscat"},{"key":"860_CR59","unstructured":"Oman Chamber of Commerce (2023) Annual economic and cybersecurity review. Muscat"},{"issue":"1","key":"860_CR60","first-page":"45","volume":"12","author":"A Al-Harthi","year":"2024","unstructured":"Al-Harthi A (2024) Cultural resistance and AI adoption challenges in Oman. Arab J Manag Innov 12(1):45\u201357","journal-title":"Arab J Manag Innov"},{"issue":"1","key":"860_CR61","first-page":"88","volume":"7","author":"A Al-Rawahi","year":"2025","unstructured":"Al-Rawahi A (2025) Operational effectiveness of AI in the banking sector of Oman. Oman Bus Rev 7(1):88\u2013103","journal-title":"Oman Bus Rev"},{"issue":"3","key":"860_CR62","first-page":"112","volume":"15","author":"M Al-Hajri","year":"2023","unstructured":"Al-Hajri M (2023) Organizational learning from cybersecurity incidents: a study of Oman\u2019s financial sector. Int J Cybersecur Res 15(3):112\u2013129","journal-title":"Int J Cybersecur Res"},{"key":"860_CR63","unstructured":"Capgemini (2019) Public sector priorities in global Cyber defense. Capgemini Res Inst"},{"issue":"4","key":"860_CR64","doi-asserted-by":"publisher","first-page":"324","DOI":"10.14569\/IJACSA.2019.0100444","volume":"10","author":"K Alansari","year":"2019","unstructured":"Alansari K, Alhaddad M, AlKindi S (2019) Cybercrime and cybersecurity: a comprehensive analysis of challenges and solutions. Int J Adv Comput Sci Appl 10(4):324\u2013337. https:\/\/doi.org\/10.14569\/IJACSA.2019.0100444","journal-title":"Int J Adv Comput Sci Appl"},{"key":"860_CR65","unstructured":"Gartner (2025) The 2025 hype cycle for artificial intelligence goes beyond GenAI. https:\/\/www.gartner.com\/en\/articles\/hype-cycle-for-artificial-intelligence"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00860-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00860-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00860-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:31:09Z","timestamp":1774618269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00860-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,23]]},"references-count":65,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["860"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00860-2","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,23]]},"assertion":[{"value":"2 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"48"}}