Author
Contributions by role
Author 2
Muhammad Abbas Khan
Faculty of Electrical Engineering, West Pomeranian University of Technology, Szczecin, Poland
Summary
Edited Journals
IECE Contributions

Free Access | Research Article | 19 May 2025
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection
IECE Transactions on Sensing, Communication, and Control | Volume 2, Issue 2: 106-121, 2025 | DOI: 10.62762/TSCC.2024.433246
Abstract
To address evolving security challenges in cloud computing, this study proposes a hybrid deep learning architecture integrating Bidirectional Long Short-Term Memory (BiLSTM) and Bidirectional Gated Recurrent Units (BiGRU) for cloud intrusion detection. The BiLSTM-BiGRU model synergizes BiLSTM's long-term dependency modeling with BiGRU's efficient gating mechanisms, achieving a detection accuracy of 96.7% on the CIC-IDS 2018 dataset. It outperforms CNN-LSTM baselines by 2.2% accuracy, 3.3% precision, 3.6% recall, and 3.6% F1-score while maintaining 0.03% false positive rate. The architecture demonstrates operational efficiency through 20% reduced computational latency and 15% lower memory foo... More >

Graphical Abstract
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection

Free Access | Research Article | 31 December 2024 | Cited: 1
Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques
IECE Transactions on Sensing, Communication, and Control | Volume 1, Issue 2: 136-153, 2024 | DOI: 10.62762/TSCC.2024.626147
Abstract
In recent years, vehicular ad hoc networks (VANETs) have faced growing security concerns, particularly from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These attacks flood the network with malicious traffic, disrupting services and compromising resource availability. While various techniques have been proposed to address these threats, this study presents an optimized framework leveraging advanced deep-learning models for improved detection accuracy. The proposed Intrusion Detection System (IDS) employs Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and Deep Belief Networks (DBN) alongside robust feature selection techniques, Random Projecti... More >

Graphical Abstract
Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques