1 Information and Communication Sciences, Ball State University, Muncie, IN, USA.
2 Management, Law and Social Sciences, University of Bradford, West Yorkshire, UK.
3 Mathematical Sciences, Montana States University, Bozeman, Montana, USA.
4 Finance, The American University, Washington, District of Columbia, USA.
5 Computer Science, San Francisco Bay University, Fremont, California, USA.
6 Mechanical Engineering, University of Florida, Gainesville, Florida, USA.
International Journal of Science and Research Archive, 2025, 14(01), 561-569
Article DOI: 10.30574/ijsra.2025.14.1.0108
Received on 01 December 2024; revised on 08 January 2025; accepted on 11 January 2025
The ever-changing nature of cyber threats calls for a rapid innovative response that can arrest the situation. Quantum computing offers hope through its highly efficient and complex computing power that can intelligently detect cyber threats in the network systems. This paper examines the adoption of quantum computing into the frameworks for the detection of cyber threats. It also highlights the benefits, methodologies and real-world applications of quantum models. In addition, several quantum algorithms like Grover’s and Shor’s are assessed in terms of their contributions to cybersecurity or defense. This paper also includes methods, materials, comparative analysis, implementation strategies and practical applications in practical situations. Limitations, areas that require future research and the need to develop quantum-safe security mechanisms form the concluding part of this research paper.
Quantum Computing; Cybersecurity; Artificial Intelligence; Cyber Attacks; Quantum Algorithm
Preview Article PDF
Olalekan Olorunfemi Fagbo, Opeyemi Bilqees Adewusi, David Agyemfra Atakora, ThankGod Steven Lawrence, Sosanya Adebayo Olufemi and Zim Ezevillo. Designing intelligent cyber threat detection systems through quantum computing. International Journal of Science and Research Archive, 2025, 14(01), 561-569. Article DOI: https://doi.org/10.30574/ijsra.2025.14.1.0108.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0