Quantum Machine Learning in Cloud-Based Security Services and Applications Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.4018/979-8-3693-6925-8.ch010
The integration of Quantum Machine Learning (QML) into cloud-based security services represents a transformative shift in cybersecurity. By leveraging quantum computing's ability to process data exponentially faster than classical systems, QML enhances cloud security with real-time threat detection, anomaly recognition, and intrusion prevention. It introduces quantum-inspired algorithms, quantum versions of classical algorithms, and hybrid quantum-classical models, each offering unique advantages in processing speed and scalability. However, the rise of quantum computing also threatens conventional encryption methods like RSA and ECC, necessitating the development of quantum-resistant encryption techniques. Despite challenges posed by current quantum devices, QML's potential to revolutionize cloud security is immense, providing faster, more efficient, and robust protection against evolving cyber threats.
Related Topics
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.4018/979-8-3693-6925-8.ch010
- OA Status
- gold
- References
- 15
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412958982
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412958982Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.4018/979-8-3693-6925-8.ch010Digital Object Identifier
- Title
-
Quantum Machine Learning in Cloud-Based Security Services and ApplicationsWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-07-09Full publication date if available
- Authors
-
C.P. Ravikumar, K Raghavendar, Isha Batra, Ghadah Naif Alwakid, Khulud Salem AlshudukhiList of authors in order
- Landing page
-
https://doi.org/10.4018/979-8-3693-6925-8.ch010Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.4018/979-8-3693-6925-8.ch010Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
15Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412958982 |
|---|---|
| doi | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| ids.doi | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| ids.openalex | https://openalex.org/W4412958982 |
| fwci | 0.0 |
| type | book-chapter |
| title | Quantum Machine Learning in Cloud-Based Security Services and Applications |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 228 |
| biblio.first_page | 215 |
| topics[0].id | https://openalex.org/T10682 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9987999796867371 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Quantum Computing Algorithms and Architecture |
| topics[1].id | https://openalex.org/T10020 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9954000115394592 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Quantum Information and Cryptography |
| topics[2].id | https://openalex.org/T10270 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9771999716758728 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Blockchain Technology Applications and Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7569670081138611 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5709288120269775 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C111919701 |
| concepts[2].level | 1 |
| concepts[2].score | 0.16393452882766724 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[2].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.7569670081138611 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5709288120269775 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/operating-system |
| keywords[2].score | 0.16393452882766724 |
| keywords[2].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.4018/979-8-3693-6925-8.ch010 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Analyzing Mobile Apps Using Smart Assessment Methodology |
| locations[0].landing_page_url | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5036733255 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0809-5545 |
| authorships[0].author.display_name | C.P. Ravikumar |
| authorships[0].affiliations[0].raw_affiliation_string | Sreenidhi University, Hyderabad, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ravikumar Ch |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Sreenidhi University, Hyderabad, India |
| authorships[1].author.id | https://openalex.org/A5061589682 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-5554-2614 |
| authorships[1].author.display_name | K Raghavendar |
| authorships[1].affiliations[0].raw_affiliation_string | TKR College of Engineering, India |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | K. Raghavendar |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | TKR College of Engineering, India |
| authorships[2].author.id | https://openalex.org/A5006189884 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2958-214X |
| authorships[2].author.display_name | Isha Batra |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I110360157 |
| authorships[2].affiliations[0].raw_affiliation_string | Lovely Professional University, India |
| authorships[2].institutions[0].id | https://openalex.org/I110360157 |
| authorships[2].institutions[0].ror | https://ror.org/00et6q107 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I110360157 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Lovely Professional University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Isha Batra |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Lovely Professional University, India |
| authorships[3].author.id | https://openalex.org/A5063173228 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-2708-2064 |
| authorships[3].author.display_name | Ghadah Naif Alwakid |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I199702508 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Computer and Information Sciences, Jouf University, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I199702508 |
| authorships[3].institutions[0].ror | https://ror.org/02zsyt821 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I199702508 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | Jouf University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Ghadah Naif Alwakid |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Computer and Information Sciences, Jouf University, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5067936332 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4210-1240 |
| authorships[4].author.display_name | Khulud Salem Alshudukhi |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I199702508 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Computer and Information Sciences, Jouf University, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I199702508 |
| authorships[4].institutions[0].ror | https://ror.org/02zsyt821 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I199702508 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | Jouf University |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Khulud Salem S. Alshudukhi |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Computer and Information Sciences, Jouf University, Saudi Arabia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Quantum Machine Learning in Cloud-Based Security Services and Applications |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10682 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9987999796867371 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Quantum Computing Algorithms and Architecture |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4244478748, https://openalex.org/W3150465815, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W1997222214, https://openalex.org/W2560439919 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.4018/979-8-3693-6925-8.ch010 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Analyzing Mobile Apps Using Smart Assessment Methodology |
| best_oa_location.landing_page_url | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| primary_location.id | doi:10.4018/979-8-3693-6925-8.ch010 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Analyzing Mobile Apps Using Smart Assessment Methodology |
| primary_location.landing_page_url | https://doi.org/10.4018/979-8-3693-6925-8.ch010 |
| publication_date | 2025-07-09 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4394998569, https://openalex.org/W3047634080, https://openalex.org/W4391715170, https://openalex.org/W4213212652, https://openalex.org/W2743068933, https://openalex.org/W2524919294, https://openalex.org/W3111162498, https://openalex.org/W2798967590, https://openalex.org/W2946124108, https://openalex.org/W2051267297, https://openalex.org/W3118870888, https://openalex.org/W3135681774, https://openalex.org/W4405602278, https://openalex.org/W4288349226, https://openalex.org/W4297801632 |
| referenced_works_count | 15 |
| abstract_inverted_index.a | 12 |
| abstract_inverted_index.By | 17 |
| abstract_inverted_index.It | 43 |
| abstract_inverted_index.by | 90 |
| abstract_inverted_index.in | 15, 60 |
| abstract_inverted_index.is | 100 |
| abstract_inverted_index.of | 2, 49, 68, 83 |
| abstract_inverted_index.to | 22, 96 |
| abstract_inverted_index.QML | 30 |
| abstract_inverted_index.RSA | 77 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 40, 52, 63, 78, 106 |
| abstract_inverted_index.the | 66, 81 |
| abstract_inverted_index.ECC, | 79 |
| abstract_inverted_index.also | 71 |
| abstract_inverted_index.data | 24 |
| abstract_inverted_index.each | 56 |
| abstract_inverted_index.into | 7 |
| abstract_inverted_index.like | 76 |
| abstract_inverted_index.more | 104 |
| abstract_inverted_index.rise | 67 |
| abstract_inverted_index.than | 27 |
| abstract_inverted_index.with | 34 |
| abstract_inverted_index.(QML) | 6 |
| abstract_inverted_index.QML's | 94 |
| abstract_inverted_index.cloud | 32, 98 |
| abstract_inverted_index.cyber | 111 |
| abstract_inverted_index.posed | 89 |
| abstract_inverted_index.shift | 14 |
| abstract_inverted_index.speed | 62 |
| abstract_inverted_index.faster | 26 |
| abstract_inverted_index.hybrid | 53 |
| abstract_inverted_index.robust | 107 |
| abstract_inverted_index.threat | 36 |
| abstract_inverted_index.unique | 58 |
| abstract_inverted_index.Despite | 87 |
| abstract_inverted_index.Machine | 4 |
| abstract_inverted_index.Quantum | 3 |
| abstract_inverted_index.ability | 21 |
| abstract_inverted_index.against | 109 |
| abstract_inverted_index.anomaly | 38 |
| abstract_inverted_index.current | 91 |
| abstract_inverted_index.faster, | 103 |
| abstract_inverted_index.methods | 75 |
| abstract_inverted_index.models, | 55 |
| abstract_inverted_index.process | 23 |
| abstract_inverted_index.quantum | 19, 47, 69, 92 |
| abstract_inverted_index.However, | 65 |
| abstract_inverted_index.Learning | 5 |
| abstract_inverted_index.devices, | 93 |
| abstract_inverted_index.enhances | 31 |
| abstract_inverted_index.evolving | 110 |
| abstract_inverted_index.immense, | 101 |
| abstract_inverted_index.offering | 57 |
| abstract_inverted_index.security | 9, 33, 99 |
| abstract_inverted_index.services | 10 |
| abstract_inverted_index.systems, | 29 |
| abstract_inverted_index.threats. | 112 |
| abstract_inverted_index.versions | 48 |
| abstract_inverted_index.classical | 28, 50 |
| abstract_inverted_index.computing | 70 |
| abstract_inverted_index.intrusion | 41 |
| abstract_inverted_index.potential | 95 |
| abstract_inverted_index.providing | 102 |
| abstract_inverted_index.real-time | 35 |
| abstract_inverted_index.threatens | 72 |
| abstract_inverted_index.advantages | 59 |
| abstract_inverted_index.challenges | 88 |
| abstract_inverted_index.detection, | 37 |
| abstract_inverted_index.efficient, | 105 |
| abstract_inverted_index.encryption | 74, 85 |
| abstract_inverted_index.introduces | 44 |
| abstract_inverted_index.leveraging | 18 |
| abstract_inverted_index.processing | 61 |
| abstract_inverted_index.protection | 108 |
| abstract_inverted_index.represents | 11 |
| abstract_inverted_index.algorithms, | 46, 51 |
| abstract_inverted_index.cloud-based | 8 |
| abstract_inverted_index.computing's | 20 |
| abstract_inverted_index.development | 82 |
| abstract_inverted_index.integration | 1 |
| abstract_inverted_index.prevention. | 42 |
| abstract_inverted_index.techniques. | 86 |
| abstract_inverted_index.conventional | 73 |
| abstract_inverted_index.recognition, | 39 |
| abstract_inverted_index.scalability. | 64 |
| abstract_inverted_index.exponentially | 25 |
| abstract_inverted_index.necessitating | 80 |
| abstract_inverted_index.revolutionize | 97 |
| abstract_inverted_index.cybersecurity. | 16 |
| abstract_inverted_index.transformative | 13 |
| abstract_inverted_index.quantum-inspired | 45 |
| abstract_inverted_index.quantum-classical | 54 |
| abstract_inverted_index.quantum-resistant | 84 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.42222065 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |