8 results ·
● Live web index
N
nature.com
article
https://www.nature.com/articles/s41598-026-40634-z
This study proposes a framework that uses quantum transfer learning to enhance cybersecurity threat detection by leveraging multiple datasets, including UNSW-NB15, CICIDS2017, CSE-CIC-IDS2018, and TON\_IoT. This study explores quantum transfer learning for intrusion detection by applying quantum-enhanced feature extraction and transfer learning across multiple benchmark cybersecurity datasets, including UNSW-NB15, CICIDS2017, CSE-CIC-IDS2018, and TON\_IoT. * Experimental results show that the proposed quantum-enhanced model achieves competitive performance, including an accuracy of 83% on UNSW-NB15 and up to 91% on CICIDS2017 and CSE-CIC-IDS2018, demonstrating the feasibility of quantum transfer learning for cybersecurity applications. Although several existing deep learning-based intrusion detection approaches reported in the literature achieve higher accuracy on benchmark datasets such as UNSW-NB15, CICIDS2017, and TON\_IoT, the proposed quantum transfer learning framework demonstrates competitive performance while offering additional advantages. The experimental results demonstrate that the proposed quantum transfer learning framework effectively captures transferable features across heterogeneous cybersecurity datasets, thereby improving cross-domain threat detection and categorization performance.
A
arxiv.org
article
https://arxiv.org/html/2512.18493v1
How do we develop and train QML models of threat detection for cybersecurity? This includes the practical challenges of designing quantum
B
blog.meetneura.ai
article
https://blog.meetneura.ai/quantum-ml-cybersecurity/
Discover how Quantum Machine Learning for Cybersecurity can speed up threat detection, improve precision, and integrate with existing SOC
A
accessitgroup.com
article
https://www.accessitgroup.com/quantum-computing-artificial-intelligence-and-t…
Quantum-Enhanced Threat Detection: With quantum computing power, AI systems can analyze complex data sets to uncover sophisticated cyber threats that might
S
safe.security
article
https://safe.security/resources/insights/understanding-quantum-computing-in-c…
[Platform](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/). [Solutions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Customers](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Partners](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [FAIR](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Why SAFE?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Resources](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Company](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). 1. [What is Quantum Computing?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#What-is-Quantum-Computing--0). 1. [Key Differences from Classical Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Key-Differences-from-Classical-Computing-1). 2. [Impact on Computational Speed](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Impact-on-Computational-Speed-2). 2. [Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Quantum-Computing-in-Cybersecurity-3). 1. [Current Use Cases](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Current-Use-Cases-4). 3. [Potential Cybersecurity Risks with Quantum Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Potential-Cybersecurity-Risks-with-Quantum-Computing-5). 4. [Practical Applications for Cybersecurity Professionals](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Practical-Applications-for-Cybersecurity-Professionals-6). 5. [The Future of Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#The-Future-of-Quantum-Computing-in-Cybersecurity-7). 6. [Frequently Asked Questions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#-------------------Frequently-Asked-Questions-----------------8). At its core, [quantum computing](https://www.ibm.com/think/topics/quantum-computing?utm_medium=website&utm_source=direct&utm_campaign=safe-security) uses the fundamental principles of quantum mechanics—such as qubits, superposition, and entanglement—to process data at significantly faster rates than classical computers for certain types of problems. Quantum Computing](https://safe.security/wp-content/uploads/Traditional-vs.-Quantum-Computing-1024x576.png). However, future large-scale quantum computers could break these encryption standards by leveraging [Shor’s Algorithm](https://www.classiq.io/insights/shors-algorithm-explained?utm_medium=website&utm_source=direct&utm_campaign=safe-security), a quantum algorithm that efficiently factors large prime numbers and computes discrete logarithms, rendering RSA and ECC encryption vulnerable. **Solution:** Quantum-resistant encryption algorithms, such as [lattice-based cryptography](https://www.redhat.com/en/blog/post-quantum-cryptography-lattice-based-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security), are being developed to mitigate this risk. As part of its [Post-Quantum Cryptography (PQC) Standardization Project,](https://csrc.nist.gov/projects/post-quantum-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security) NIST has been evaluating and selecting encryption algorithms designed to withstand attacks from quantum computers.
S
sciencedirect.com
article
https://www.sciencedirect.com/science/article/abs/pii/S0045790625005920
In Table 2, the research questions are systematically formulated by first identifying critical cybersecurity challenges posed by quantum computing (e.g., threats to RSA, ECC, and AES via Shor’s and Grover’s algorithms) and then pairing each question with proposed quantum-resistant solutions (e.g., post-quantum cryptography, QKD, or hybrid systems). ### [Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions](https://www.sciencedirect.com/science/article/pii/S2452414X24000384). ### [Using quantum key distribution for cryptographic purposes: A survey](https://www.sciencedirect.com/science/article/pii/S0304397514006963). ### [Quantum computing research in medical sciences](https://www.sciencedirect.com/science/article/pii/S2352914824001631). ### [Role of quantum computing in shaping the future of 6 G technology](https://www.sciencedirect.com/science/article/pii/S0950584924000594). ### [Distributed quantum computing: A survey](https://www.sciencedirect.com/science/article/pii/S1389128624005048). ### [Unraveling quantum computing system architectures: An extensive survey of cutting-edge paradigms](https://www.sciencedirect.com/science/article/pii/S0950584923002355). ### [Quantum computing: Vision and challenges](https://www.sciencedirect.com/science/article/pii/B9780443290961000088). ### [Quantum decryption using Shor’s algorithm](https://www.sciencedirect.com/science/article/pii/S2214785323038178). ### [Using quantum amplitude amplification in genetic algorithms](https://www.sciencedirect.com/science/article/pii/S0957417422013604). * ### [Classification of security challenges and mitigation approaches in the quantum software engineering](https://www.sciencedirect.com/science/article/pii/S0164121226001172). * ### [Integrating quantum computing with federated learning for enhanced security and privacy in IoT networks](https://www.sciencedirect.com/science/article/pii/S259012302504544X).
E
exabeam.com
article
https://www.exabeam.com/blog/infosec-trends/quantum-threats-to-machine-learni…
# Quantum Threats to Machine Learning: The Next Security Reckoning. Quantum computing endangers every layer of model integrity. Even without quantum power, determined attackers can already pull data out of trained models through techniques like model inversion or membership inference. These attacks exploit the statistical leakage between model weights and training data, which is a weakness quantum algorithms could exploit at scale. The “harvest-now, decrypt-later” strategy involves collecting encrypted model data today, knowing that tomorrow’s quantum computers will be able to crack it. Encrypted training sets, model weights, or API traffic stored today may all be fair game once quantum decryption becomes feasible. Quantum computing will redefine how AI systems are attacked and protected. CISOs who start building quantum-ready AI defenses today will be setting the benchmark for secure AI innovation tomorrow. Adversarial manipulation, data inference, poisoning, and theft aren’t speculative, they’re already happening, and quantum computing will only magnify their impact.
D
docs.paloaltonetworks.com
article
https://docs.paloaltonetworks.com/network-security/quantum-security/administr…
Quantum computers will break classical cryptography with threats including harvest now, decrypt later attacks. A CRQC is a QC optimized for using quantum algorithms to break encryption in seconds instead of in the millions of years that a classical supercomputer would take. QCs use the laws of quantum mechanics to vastly decrease the amount of time it takes to process data and run algorithms, including algorithms that can break classical decryption. However, attackers can use them to factor large numbers using quantum algorithms, which is how to break asymmetric encryption. The vastly increased processing power and speed of QCs threaten to break classical methods for encrypting data, which could compromise your public key infrastructure (PKI). However, given the processing power of a CRQC, Shor's algorithm can factor complex numbers and crack classical asymmetrical encryption (such as the key exchange material needed to decrypt data) in seconds or less. Because classical computers don't have anywhere near enough processing power, they can't use Grover's algorithm to break symmetric encryption.