{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:10:45Z","timestamp":1775146245367,"version":"3.50.1"},"reference-count":88,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008422","name":"University of Pretoria UDP","doi-asserted-by":"publisher","award":["A1H895"],"award-info":[{"award-number":["A1H895"]}],"id":[{"id":"10.13039\/501100008422","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine learning (ML) techniques offer a promising approach for enhancing anomaly detection in network traffic. This study evaluates several ML models on a labeled network traffic dataset, with a focus on zero-day attack detection. Ensemble learning methods, particularly eXtreme gradient boosting (XGBoost), achieved perfect classification, identifying all 6231 zero-day instances without false positives and maintaining efficient training and prediction times. While classical support vector machines (SVMs) performed modestly at 64% accuracy, their performance improved to 98% with the use of the borderline synthetic minority oversampling technique (SMOTE) and SMOTE + edited nearest neighbours (SMOTEENN). To explore quantum-enhanced alternatives, a quantum SVM (QSVM) is implemented using three-qubit and four-qubit quantum circuits simulated on the aer_simulator_statevector. The QSVM achieved high accuracy (99.89%) and strong F1-scores (98.95%), indicating that nonlinear quantum feature maps (QFMs) can increase sensitivity to zero-day exploit patterns. Unlike prior work that applies standard quantum kernels, this study introduces a parameterised quantum feature encoding scheme, where each classical feature is mapped using a nonlinear function tuned by a set of learnable parameters. Additionally, a sparse entanglement topology is derived from mutual information between features, ensuring a compact and data-adaptive quantum circuit that aligns with the resource constraints of noisy intermediate-scale quantum (NISQ) devices. Our contribution lies in formalising a quantum circuit design that enables scalable, expressive, and generalisable quantum architectures tailored for zero-day attack detection. This extends beyond conventional usage of QSVMs by offering a principled approach to quantum circuit construction for cybersecurity. While these findings are obtained via noiseless simulation, they provide a theoretical proof of concept for the viability of quantum ML (QML) in network security. Future work should target real quantum hardware execution and adaptive sampling techniques to assess robustness under decoherence, gate errors, and dynamic threat environments.<\/jats:p>","DOI":"10.3390\/computers14080331","type":"journal-article","created":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T16:09:55Z","timestamp":1755274195000},"page":"331","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection"],"prefix":"10.3390","volume":"14","author":[{"given":"Steven Jabulani","family":"Nhlapo","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Pretoria, Pretoria 0028, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5876-7682","authenticated-orcid":false,"given":"Elodie Ngoie","family":"Mutombo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Pretoria 0028, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0938-113X","authenticated-orcid":false,"given":"Mike Nkongolo Wa","family":"Nkongolo","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Pretoria, Pretoria 0028, South Africa"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,15]]},"reference":[{"key":"ref_1","first-page":"10933","article-title":"POPIA code of conduct for research (with corrigendum)","volume":"117","author":"Adams","year":"2021","journal-title":"S. Afr. J. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1007\/s10489-025-06422-4","article-title":"Advanced IDS: A comparative study of datasets and machine learning algorithms for network flow-based intrusion detection systems","volume":"55","author":"Mondragon","year":"2025","journal-title":"Appl. Intell."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"104167","DOI":"10.1016\/j.cose.2024.104167","article-title":"Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language","volume":"148","author":"Gaber","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Emrouznejad, A., Zervopoulos, P.D., Ozturk, I., Jamali, D., and Rice, J. (2024). Anomaly Detection in Enterprise Payment Systems: An Ensemble Machine Learning Approach. Proceedings of the Business Analytics and Decision Making in Practice, Springer International Publishing.","DOI":"10.1007\/978-3-031-61589-4"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"13941","DOI":"10.1007\/s10489-022-03244-6","article-title":"Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier","volume":"52","author":"Zahoora","year":"2022","journal-title":"Appl. Intell."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"108108","DOI":"10.1109\/ACCESS.2025.3580395","article-title":"Ransomware Family Attribution with ML: A Comprehensive Evaluation of Datasets Quality, Models Comparison and a Simulated Deployment","volume":"13","year":"2025","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s12083-025-02014-8","article-title":"Federated Active Meta-Learning with Blockchain for Zero-Day Attack Detection in Industrial IoT","volume":"18","author":"Kumar","year":"2025","journal-title":"Peer -Peer Netw. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Anjum, A., Subramanian, P.R., Stalinbabu, R., Kothapeta, D., Sheela, K.S., and Jegajothi, B. (2025, January 14\u201316). Detecting Zero-Day Attacks using Advanced Anomaly Detection in Network Traffic. Proceedings of the 2025 5th International Conference on Pervasive Computing and Social Networking (ICPCSN), IEEE, Salem, India.","DOI":"10.1109\/ICPCSN65854.2025.11034868"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","article-title":"A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework","volume":"199","author":"Kasongo","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mohamed, A.A., Al-Saleh, A., Sharma, S.K., and Tejani, G.G. (2025). Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet). Sci. Rep., 15.","DOI":"10.1038\/s41598-025-87615-2"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/s11760-025-04396-x","article-title":"Generative Mathematical Models for Ransomware Attack Prediction Using Chi-Square Feature Selection for Enhanced Accuracy","volume":"19","author":"Su","year":"2025","journal-title":"Signal Image Video Process."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rojas, R.V.B. (2024). Artificial Intelligence: Genesis, Development, and Future. Revolutionizing Communication, CRC Press.","DOI":"10.1201\/9781003473633-1"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yan, P., Khoei, T.T., Hyder, R.S., and Hyder, R.S. (2024, January 17\u201319). A Dual-Stage Ensemble Approach to Detect and Classify Ransomware Attacks. Proceedings of the 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), Yorktown Heights, NY, USA.","DOI":"10.1109\/UEMCON62879.2024.10754695"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"104072","DOI":"10.1016\/j.jnca.2024.104072","article-title":"QuIDS: A Quantum Support Vector machine-based Intrusion Detection System for IoT networks","volume":"234","author":"Kumar","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Durgut, S., K\u00fc\u00e7\u00fcksille, E.U., and Tokmak, M. (2025). Hybrid Quantum\u2013Classical Deep Neural Networks Based Smart Contract Vulnerability Detection. Appl. Sci., 15.","DOI":"10.3390\/app15074037"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"e70018","DOI":"10.1002\/nem.70018","article-title":"Quantumnetsec: Quantum machine learning for network security","volume":"35","author":"Abreu","year":"2025","journal-title":"Int. J. Netw. Manag."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Caivano, D., De Vincentiis, M., Pal, A., and Ragone, A. (2023). Securing Smart Cities: Unraveling Quantum as a Service. QP4SE 2023, Proceedings of the 2nd International Workshop on Quantum Programming for Software Engineering, San Francisco, CA, USA, 4 December 2023, Association for Computing Machinery.","DOI":"10.1145\/3617570.3617865"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"104964","DOI":"10.1016\/j.micpro.2023.104964","article-title":"A framework for detection of cyber attacks by the classification of intrusion detection datasets","volume":"105","author":"Srivastava","year":"2024","journal-title":"Microprocess. Microsystems"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1109\/TNSM.2024.3490181","article-title":"Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments","volume":"22","author":"Rookard","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1109\/OJCS.2025.3564266","article-title":"UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems","volume":"6","author":"Zhang","year":"2025","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref_21","unstructured":"Goel, S., Uzun, E., Xie, M., and Sarkar, S. (2025). Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review. Proceedings of the Digital Forensics and Cyber Crime, Springer International Publishing."},{"key":"ref_22","unstructured":"Communications in Computer and Information Science, Gerber, A., and Coetzee, M. (2023). Zero-Day Threats Detection for Critical Infrastructures. Proceedings of the South African Institute of Computer Scientists and Information Technologists, Springer International Publishing."},{"key":"ref_23","first-page":"0140129","article-title":"Deep Analysis of Risks and Recent Trends Towards Network Intrusion Detection System","volume":"14","author":"Shankar","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Sokhonn, L., Park, Y.S., and Lee, M.K. (2024). Hierarchical Clustering via Single and Complete Linkage Using Fully Homomorphic Encryption. Sensors, 24.","DOI":"10.3390\/s24154826"},{"key":"ref_25","first-page":"96","article-title":"Ransomware Detection Using Machine Learning Techniques","volume":"3","author":"Chaudhary","year":"2024","journal-title":"Res. CAB A J. Res. Dev."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1109\/OJCOMS.2025.3537957","article-title":"An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection","volume":"6","author":"Kadi","year":"2025","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"105340","DOI":"10.1016\/j.dsp.2025.105340","article-title":"One-to-many image generation model based on parameterized quantum circuits","volume":"165","author":"Pei","year":"2025","journal-title":"Digit. Signal Process."},{"key":"ref_28","first-page":"100005","article-title":"Quantum-driven zero trust architecture with dynamic anomaly detection in 7G technology: A neural network approach","volume":"2\u20133","author":"Ahmed","year":"2025","journal-title":"Meas. Digit."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Watkins, W.M., Chen, S.Y.C., and Yoo, S. (2023). Quantum machine learning with differential privacy. Sci. Rep., 13.","DOI":"10.1038\/s41598-022-24082-z"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mohammadisavadkoohi, E., Shafiabady, N., and Vakilian, J. (IEEE Trans. Artif. Intell., 2025). A Systematic Review on Quantum Machine Learning Applications in Classification, IEEE Trans. Artif. Intell., Early Access.","DOI":"10.1109\/TAI.2025.3567960"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42484-025-00258-4","article-title":"Unsupervised beyond-standard-model event discovery at the LHC with a novel quantum autoencoder","volume":"7","author":"Duffy","year":"2025","journal-title":"Quantum Mach. Intell."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Akter, M.S., Shahriar, H., Cuzzocrea, A., and Wu, F. (2024, January 2\u20134). Quantum Adversarial Attacks: Developing Quantum FGSM Algorithm. Proceedings of the 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), Osaka, Japan.","DOI":"10.1109\/COMPSAC61105.2024.00145"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2400325","DOI":"10.1002\/qute.202400325","article-title":"What can we learn from quantum convolutional neural networks?","volume":"8","author":"Umeano","year":"2025","journal-title":"Adv. Quantum Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"067001","DOI":"10.1103\/PhysRevApplied.21.067001","article-title":"Quantum machine learning on near-term quantum devices: Current state of supervised and unsupervised techniques for real-world applications","volume":"21","author":"Gujju","year":"2024","journal-title":"Phys. Rev. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"9917","DOI":"10.1007\/s10586-024-04458-8","article-title":"A Novel Intrusion Detection System Based on a Hybrid Quantum Support Vector Machine and Improved Grey Wolf Optimizer","volume":"27","author":"Elsedimy","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Eze, L., Chaudhry, U.B., and Jahankhani, H. (2025). Quantum-Enhanced Machine Learning for Cybersecurity: Evaluating Malicious URL Detection. Electronics, 14.","DOI":"10.3390\/electronics14091827"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi, M., Shalinie, S.M., and Bharathi, J.V. (2025, January 20\u201322). A Comparative Analysis of Kernel Methods in Quantum Support Vector Machines for Network Anomaly Detection. Proceedings of the 2025 Fourth International Conference on Power, Control and Computing Technologies (ICPC2T), IEEE, Raipur, India.","DOI":"10.1109\/ICPC2T63847.2025.10958729"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-025-95897-9","article-title":"Entanglement detection with quantum support vector machine (QSVM) on near-term quantum devices","volume":"15","author":"Mahdian","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/s11227-024-06615-7","article-title":"A Quantum LSTM-based approach to cyber threat detection in virtual environment","volume":"81","author":"Tripathi","year":"2024","journal-title":"J. Supercomput."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"104027","DOI":"10.1109\/ACCESS.2025.3576506","article-title":"An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption","volume":"13","author":"Saeed","year":"2025","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1140\/epjqt\/s40507-025-00380-z","article-title":"Unified hybrid quantum classical neural network framework for detecting distributed denial of service and Android mobile malware attacks","volume":"12","author":"Sridevi","year":"2025","journal-title":"EPJ Quantum Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"104341","DOI":"10.1016\/j.cose.2025.104341","article-title":"Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems","volume":"154","author":"Bellante","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3771","DOI":"10.1007\/s10586-023-04168-7","article-title":"Intrusion detection based on ensemble learning for big data classification","volume":"27","author":"Jemili","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/s11760-025-03813-5","article-title":"Machine learning pipelines for IoT botnet detection and behavior characterization in heavily imbalanced settings","volume":"19","year":"2025","journal-title":"Signal Image Video Process."},{"key":"ref_45","first-page":"200543","article-title":"Anomaly-based intrusion detection system based on SMOTE-IPF, Whale Optimization Algorithm, and ensemble learning","volume":"27","author":"Shana","year":"2025","journal-title":"Intell. Syst. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2460429","DOI":"10.1080\/21642583.2025.2460429","article-title":"AccFIT-IDS: Accuracy-based feature inclusion technique for intrusion detection system","volume":"13","author":"Rajathi","year":"2025","journal-title":"Syst. Sci. Control Eng."},{"key":"ref_47","unstructured":"Manoharan, S., Tugui, A., and Perikos, I. (2025, January 30\u201331). A Comprehensive Literature Review: Feature Engineering Techniques in Enhancing Machine and Deep Learning Models Optimization for Intrusion Detection Systems. Proceedings of the 5th International Conference on Artificial Intelligence and Smart Energy, Coimbatore, India."},{"key":"ref_48","first-page":"639","article-title":"Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model","volume":"143","author":"Iftikhar","year":"2025","journal-title":"CMES-Comput. Model. Eng. Sci."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Sattar, S., Khan, S., Khan, M.I., Akhmediyarova, A., Mamyrbayev, O., Kassymova, D., Oralbekova, D., and Alimkulova, J. (2025). Anomaly detection in encrypted network traffic using self-supervised learning. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-08568-0"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e13556","DOI":"10.1111\/exsy.13556","article-title":"Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization","volume":"42","author":"Naeem","year":"2025","journal-title":"Expert Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Chen, S., and Zheng, W. (2025). RRMSE-enhanced weighted voting regressor for improved ensemble regression. PLoS ONE, 20.","DOI":"10.1371\/journal.pone.0319515"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/LNET.2025.3525901","article-title":"Individual Packet Features are a Risk to Model Generalization in ML-Based Intrusion Detection","volume":"7","author":"Kostas","year":"2025","journal-title":"IEEE Netw. Lett."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11128-025-04728-3","article-title":"Comparative investigation of quantum and classical kernel functions applied in support vector machine algorithms","volume":"24","author":"Abdulsalam","year":"2025","journal-title":"Quantum Inf. Process."},{"key":"ref_54","first-page":"1","article-title":"Benchmarking Quantum Machine Learning Kernel Training for Classification Tasks","volume":"6","year":"2025","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TC.2024.3416619","article-title":"Quantum Support Vector Machine for Classifying Noisy Data","volume":"73","author":"Li","year":"2024","journal-title":"IEEE Trans. Comput."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Mantha, P., Kiwit, F.J., Saurabh, N., Jha, S., and Luckow, A. (2025, January 19\u201322). Pilot-Quantum: A Middleware for Quantum-HPC Resource, Workload and Task Management. Proceedings of the 2025 IEEE 25th International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Troms\u00f8, Norway.","DOI":"10.1109\/CCGRID64434.2025.00070"},{"key":"ref_57","first-page":"242","article-title":"The Graph Fractional Fourier Transform in Hilbert Space","volume":"11","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Signal Inf. Process. Over Netw."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"98229","DOI":"10.1109\/ACCESS.2025.3576216","article-title":"Quantum Hardware Devices (QHDs): Opportunities and Challenges","volume":"13","author":"Oukaira","year":"2025","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Yogaraj, K., Quanz, B., Vikas, T., Mondal, A., and Mondal, S. (2025). Post-variational classical quantum transfer learning for binary classification. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-08887-2"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"18865","DOI":"10.1109\/JIOT.2025.3535414","article-title":"A New Alliance of Machine Learning and Quantum Computing: Concepts, Attacks, and Challenges in IoT Networks","volume":"12","author":"Rishiwal","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Qayyum, T., Khan, M.W.H., Tariq, A., Serhani, M.A., Sallabi, F.M., Trabelsi, Z., and Taleb, I. (2024, January 16\u201319). Quantum Federated Learning: Bridging Quantum Computing and Distributed AI. Proceedings of the 2024 IEEE\/ACM 17th International Conference on Utility and Cloud Computing (UCC), Sharjah, United Arab Emirates.","DOI":"10.1109\/UCC63386.2024.00053"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"054301","DOI":"10.1103\/th2c-pdpw","article-title":"Quantum conditional mutual information as a probe of measurement-induced entanglement phase transitions","volume":"112","author":"Otsuka","year":"2025","journal-title":"Phys. Rev. B"},{"key":"ref_63","first-page":"1","article-title":"A Comprehensive Survey of Quantum Computing: Principles, Progress, and Prospects for Classical-Quantum Integration","volume":"5","author":"Whitlow","year":"2025","journal-title":"J. Comput. Sci. Softw. Appl."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Alqahtany, S.S., Shaikh, A., and Alqazzaz, A. (2025). Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks. Sci. Rep., 15.","DOI":"10.1038\/s41598-024-81147-x"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"101506","DOI":"10.1109\/ACCESS.2024.3431534","article-title":"A Novel IDS Based on Jaya Optimizer and Smote-ENN for Cyberattacks Detection","volume":"12","author":"Agarwal","year":"2024","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"111517","DOI":"10.1016\/j.asoc.2024.111517","article-title":"Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification","volume":"157","author":"Le","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Kiranmayee, B., Devi, M.S., Susheela, K., Dhumpati, R., Penubaka, K.K.R., and Naidu, U.G. (2025, January 18\u201320). Developing a Robust Intrusion Detection System Using SMOTE and Hybrid SVNN Model. Proceedings of the 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), IEEE, Halifax, NS, Canada.","DOI":"10.1109\/ICSADL65848.2025.10933456"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10462-025-11198-7","article-title":"A comprehensive survey of loss functions and metrics in deep learning","volume":"58","author":"Terven","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/s42484-025-00248-6","article-title":"A quantum approach to synthetic minority oversampling technique (SMOTE)","volume":"7","author":"Mohanty","year":"2025","journal-title":"Quantum Mach. Intell."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42484-025-00266-4","article-title":"Quantum machine learning: A systematic categorization based on learning paradigms, NISQ suitability, and fault tolerance","volume":"7","author":"Majid","year":"2025","journal-title":"Quantum Mach. Intell."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s11227-024-06501-2","article-title":"Enhancing movie recommendations using quantum support vector machine (QSVM)","volume":"81","author":"Shahid","year":"2025","journal-title":"J. Supercomput."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TQE.2023.3301899","article-title":"Machine-Learning-Based Qubit Allocation for Error Reduction in Quantum Circuits","volume":"4","author":"LeCompte","year":"2023","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_73","first-page":"215","article-title":"Exploring IBM Quantum Experience","volume":"Volume 1085","author":"Pandey","year":"2023","journal-title":"Quantum Computing: A Shift from Bits to Qubits"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"e1568","DOI":"10.1002\/widm.1568","article-title":"Dimensionality Reduction for Data Analysis With Quantum Feature Learning","volume":"15","author":"Sihare","year":"2025","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Akbar, M.A., Rafi, S., Khan, A., and Ye, B. (2025, January 23\u201328). Quantum Secure DevOps (QSecOps): Integrating Quantum-Based Security Checks into CI\/CD Pipelines: Next-Generation Software Security. Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, New York, NY, USA. FSE Companion \u201925.","DOI":"10.1145\/3696630.3731624"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s42484-024-00233-5","article-title":"Several fitness functions and entanglement gates in quantum kernel generation","volume":"7","author":"Wang","year":"2025","journal-title":"Quantum Mach. Intell."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1186\/s40537-025-01193-8","article-title":"Overview of leakage scenarios in supervised machine learning","volume":"12","author":"Sasse","year":"2025","journal-title":"J. Big Data"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"5222","DOI":"10.52783\/jes.6235","article-title":"Enhancing Ransomware Detection in Cybersecurity: A Comprehensive Ensemble Approach","volume":"20","author":"Rayudu","year":"2024","journal-title":"J. Electrical Systems."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"14497","DOI":"10.48084\/etasr.6915","article-title":"Ransomware early detection techniques","volume":"14","author":"Alhashmi","year":"2024","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_80","unstructured":"Tasdemir, S., and Ozkan, I.A. (2022). Deep Forest Approach for Zero-Day Attacks Detection. Proceedings of the Innovations and Technologies in Engineering, E\u011fitim Yayinevi."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Abreu, D., Rothenberg, C.E., and Abel\u00e9m, A. (2024, January 26\u201329). QML-IDS: Quantum Machine Learning Intrusion Detection System. Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC), Paris, France.","DOI":"10.1109\/ISCC61673.2024.10733655"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"105133","DOI":"10.1016\/j.jpdc.2025.105133","article-title":"SHAP-based intrusion detection in IoT networks using quantum neural networks on IonQ hardware","volume":"204","author":"Rajkumar","year":"2025","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"103471","DOI":"10.1016\/j.mex.2025.103471","article-title":"QCAE-QOC-SVM: A hybrid quantum machine learning model for DoS and Fuzzy attack detection on autonomous vehicle CAN bus","volume":"15","author":"Meghana","year":"2025","journal-title":"MethodsX"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Hammami, W., Cherkaoui, S., and Wang, S. (2025, January 12\u201316). Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time Series. Proceedings of the 2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/IWCMC65282.2025.11059562"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Atban, F., K\u00fc\u00e7\u00fckkara, M.Y., and Bay\u0131lm\u0131\u015f, C. (Eur. Phys. J. Spec. Top., 2025). Enhancing variational quantum classifier performance with meta-heuristic feature selection for credit card fraud detection, Eur. Phys. J. Spec. Top., in press.","DOI":"10.1140\/epjs\/s11734-025-01703-y"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Sikiru, I.A., Kora, A.D., Ezin, E.C., Imoize, A.L., and Li, C.T. (2024). Hybridization of learning techniques and quantum mechanism for IIoT security: Applications, challenges, and prospects. Electronics, 13.","DOI":"10.3390\/electronics13214153"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Hewa, T., Siriwardhana, Y., and Ylianttila, M. (2025, January 24\u201327). Leveraging Explainable AI for Adaptive Adversarial DoS Attack Detection in 6G IoT Networks. Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), Milan, Italy.","DOI":"10.1109\/WCNC61545.2025.10978796"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Razavi, H., Jamali, M.R., Emsaki, M., Ahmadi, A., and Hajiaghei-Keshteli, M. (2023, January 24\u201327). Quantifying the Financial Impact of Cyber Security Attacks on Banks: A Big Data Analytics Approach. Proceedings of the 2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Regina, Saskatchewan.","DOI":"10.1109\/CCECE58730.2023.10288963"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/331\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:28:45Z","timestamp":1760034525000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,15]]},"references-count":88,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["computers14080331"],"URL":"https:\/\/doi.org\/10.3390\/computers14080331","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,15]]}}}