AI-Driven Threat Detection for Cloud and Multi-Cloud Infrastructure Using Adaptive Machine Learning Techniques

Authors

  • Rajender Reddy Muddam Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3117-5481/WFCMLS26-103

Keywords:

Cloud Security, Multi-Cloud Infrastructure, Machine Learning, Threat Detection, Cybersecurity Analytics, Intelligent Security Systems

Abstract

This study examines sector-specific patterns of digital adoption among small and medium-sized enterprises (SMEs) in the retail, manufacturing, and service sectors. The purpose of the study is to analyze how digital technologies are adopted differently across sectors and to assess their impacts on operational efficiency, customer engagement, and business performance. A qualitative and descriptive methodology was employed, drawing on existing literature, industry reports, and selected case examples to compare digital tools, adoption drivers, and challenges across the three sectors. The findings reveal that retail and service SMEs demonstrate relatively high levels of digital adoption, driven by the need for customer interaction, market expansion, and service efficiency, while manufacturing SMEs adopt digital technologies more gradually due to higher costs, technical complexity, and infrastructure constraints. Across all sectors, digital adoption contributes positively to productivity, competitiveness, and scalability, though barriers such as limited digital skills, cybersecurity concerns, and financial constraints persist. The study concludes that digital transformation in SMEs is highly sector-dependent, and targeted policies, capacity-building initiatives, and sector-specific digital strategies are essential to maximize the benefits of digital adoption.

References

[1] Bishop, C. M. (2006). Pattern Recognition and Machine Learning. Springer.

[2] Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice. Pearson.

[3] Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.

[4] Aggarwal, C. C. (2015). Data Mining: The Textbook. Springer.

[5] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

Downloads

Published

2026-03-27

How to Cite

[1]
R. R. Muddam, “AI-Driven Threat Detection for Cloud and Multi-Cloud Infrastructure Using Adaptive Machine Learning Techniques”, AIJCST, pp. 28–31, Mar. 2026, doi: 10.63282/3117-5481/WFCMLS26-103.

Similar Articles

41-50 of 185

You may also start an advanced similarity search for this article.