University of Bahrain
Scientific Journals

Implementation of Machine Learning Techniques for Risks Evaluation in Cloud and Cybersecurity

Show simple item record

dc.contributor.author Aamer Fadhil, Saif
dc.contributor.author Emad Kadhim, Lubna
dc.contributor.author Ahmed Hamdi, Mahmood
dc.contributor.author Abbas Ahmed, Amjed
dc.contributor.author Kamrul Hasan, Mohammad
dc.contributor.author Islam, Shayla
dc.contributor.author Hafizah Mohd Aman, Azana
dc.contributor.author Safie, Nurhizam
dc.date.accessioned 2024-05-09T16:09:08Z
dc.date.available 2024-05-09T16:09:08Z
dc.date.issued 2024-05-09
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5662
dc.description.abstract Cloud computing has emerged as an essential element of the modern and future industry. Various corporates utilizes the capabilities of cloud computing services. There is skeptism and fear regarding application of cloud services that remains an open challenge, as it gaining and growing popularity amongst many business entities around globally. Many challenges are determined and found out research; majorly pertaining to security or protection. Since its inceptions Security risks concerning to cloud computing has invited large portion of attention. Cloud computing services and their providers are always on the lookout for new and improved security methods and solutions. Many service providers in field of cloud computing exist with their services in cloud domains. Such services comes with many features, specifications, along with techniques of acquiring security measures. Methodologies acquired and adopted by many service players to attain security is different in nature. Depending on his need and quality of security received from service providers. A user can choose a particular service. For studying a specific service that depends on its many security features is a dominant issue. In order to build a comprehensive risk assessment methodology, an extensive literature review was conducted to identify all risk factors that can affect cloud computing adoption. In this context various risk factors were identified. After feature selection methods and identification of risk factors, utilized to select most effective features. Then machine learning techniques are used as an efficient technique to analyze hazard in an environment of cloud computing. From all the partitioning strategies tested, the results showed that dividing the dataset into 96% and 4% yielded the best results. The Decision Tree Classifier method also performed the best across all the datasets. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Cloud computing, Cybersecurity, Risk Evaluation, and Machine Learning. en_US
dc.title Implementation of Machine Learning Techniques for Risks Evaluation in Cloud and Cybersecurity en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/XXXXXX
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 11 en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Malaysia en_US
dc.contributor.authorcountry Malaysia en_US
dc.contributor.authorcountry Malaysia en_US
dc.contributor.authorcountry Malaysia en_US
dc.contributor.authoraffiliation Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC) en_US
dc.contributor.authoraffiliation Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC) en_US
dc.contributor.authoraffiliation Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC) en_US
dc.contributor.authoraffiliation Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC) & Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) en_US
dc.contributor.authoraffiliation Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) en_US
dc.contributor.authoraffiliation Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) en_US
dc.contributor.authoraffiliation Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) en_US
dc.contributor.authoraffiliation Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account