{"id":10526,"date":"2025-01-04T05:29:31","date_gmt":"2025-01-04T05:29:31","guid":{"rendered":"https:\/\/icertpublication.com\/?page_id=10526"},"modified":"2026-04-03T09:16:51","modified_gmt":"2026-04-03T03:46:51","slug":"quantum-machine-learning-for-anomaly-detection-in-cyber-security-audits","status":"publish","type":"page","link":"https:\/\/icert.org.in\/index.php\/shodh-sari-2\/sodh-sari-vol-4-issue-1\/quantum-machine-learning-for-anomaly-detection-in-cyber-security-audits\/","title":{"rendered":"Quantum Machine Learning for Anomaly Detection in Cyber Security Audits"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10526\" class=\"elementor elementor-10526\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2dbeefd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dbeefd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c915404\" data-id=\"c915404\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-072c0c4 elementor-widget elementor-widget-heading\" data-id=\"072c0c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Shodh Sari-An International Multidisciplinary Journal<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f3c34 elementor-widget elementor-widget-heading\" data-id=\"a2f3c34\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol-04, Issue-01 (Jan-Mar 2025)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7550de elementor-widget elementor-widget-heading\" data-id=\"a7550de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">An International scholarly\/ academic journal, peer-reviewed\/ refereed journal, ISSN : 2959-1376<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d13c240 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d13c240\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ac2da0\" data-id=\"9ac2da0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d1bdb4 elementor-widget elementor-widget-heading\" data-id=\"4d1bdb4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Quantum Machine Learning for Anomaly Detection in Cyber Security Audits<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b39218 elementor-widget elementor-widget-text-editor\" data-id=\"6b39218\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Ganapathy, Venkatasubramanian<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"background-color: transparent; color: #000000; font-family: Calibri, sans-serif; font-size: 12pt; white-space-collapse: preserve;\">Faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI),<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"background-color: transparent; color: #000000; font-family: Calibri, sans-serif; font-size: 12pt; white-space-collapse: preserve;\"> Chennai, Tamil Nadu, Bharat<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aebb88d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aebb88d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-365e212\" data-id=\"365e212\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-16c93ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16c93ce\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bf496fc\" data-id=\"bf496fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8198b54 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8198b54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">DOI: <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.59231\/SARI7784\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #0563c1; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.59231\/SARI7784<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Subject: Computer Science \/ Information Security<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Page No: 127-154<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d4bd2fd\" data-id=\"d4bd2fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cc9f8b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7cc9f8b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Received: Oct 29, 2024<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Accepted: Dec 05, 2024<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Published: Jan 01, 2025<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-151245d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"151245d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.2; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Thematic Classification: Quantum Machine Learning, Anomaly Detection, Cyber Security, Digital Audits, Information Technology Infrastructure, Cryptographic Security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3bd7eef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3bd7eef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-88a9773\" data-id=\"88a9773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c41cc6e elementor-widget elementor-widget-heading\" data-id=\"c41cc6e\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i1-11A\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Abstract\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-686c064 elementor-widget elementor-widget-text-editor\" data-id=\"686c064\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 10pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Quantum Machine Learning (QML) is emerging as a transformative technology in cybersecurity, particularly in anomaly detection for cyber security audits. Traditional machine learning models are effective but face scalability and efficiency limitations as cyber threats grow more sophisticated. QML, leveraging quantum computing\u2019s ability to process and analyze large datasets in parallel, offers potential breakthroughs in identifying anomalous patterns that could signify cyber threats such as data breaches, insider threats, or unauthorized access. Content Analysis Research Methodology used in this research work. This paper explores the integration of QML into anomaly detection systems for cyber security audits, where detecting deviations from normal behavior is crucial. Quantum algorithms, particularly those based on Quantum Support Vector Machines (QSVM), Quantum Neural Networks (QNN), and Quantum Principal Component Analysis (QPCA) can enhance the detection of subtle anomalies that classical algorithms may overlook due to noise or the complex, high-dimensional nature of cyber data. The inherent properties of quantum computing, such as superposition and entanglement, allow for more efficient feature selection and optimization, potentially leading to faster and more accurate anomaly detection. The impact of implementing QML in cyber security audits is profound. First, it enhances detection capabilities by identifying anomalies with greater precision, reducing false positives, and improving response times to cyber incidents. Second, quantum algorithms\u2019 ability to manage exponentially large datasets makes them ideal for environments with extensive data logs, such as enterprise networks and cloud infrastructures. Third, as cyber threats become increasingly adaptive and stealthy, QML offers a dynamic solution that evolves alongside these threats by continuously learning from new patterns of attack. However, practical challenges remain, including the need for quantum hardware advancements, the development of hybrid quantum-classical models, and ensuring the interpretability of quantum models in audit scenarios. Despite these challenges, early research and experimental implementations demonstrate the potential of QML to revolutionize anomaly detection in cybersecurity audits. This paper concludes that while QML is still in its early stages, its application to anomaly detection holds promise for significantly enhancing the effectiveness of cyber security audits. The impact of this technology, when fully realized, could redefine how organizations protect their networks and data from ever-evolving cyber threats, making QML a critical area for future research and development in cybersecurity.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 10pt;\"><span style=\"font-size: 12pt; background-color: transparent; font-family: Calibri, sans-serif; color: #000000; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Keywords: <\/span><span style=\"font-size: 12pt; background-color: transparent; font-family: Calibri, sans-serif; color: #000000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Quantum Machine Learning (QML), Cyber Security Audit, Quantum Support Vector Machines (QSVM), Quantum Neural Networks (QNN), Quantum Principal Component Analysis (QPCA), Anomaly Detection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dbcec6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dbcec6a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67c5068\" data-id=\"67c5068\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cebf10 elementor-widget elementor-widget-heading\" data-id=\"3cebf10\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i1-11I\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Impact Statement<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e38b9 elementor-widget elementor-widget-text-editor\" data-id=\"94e38b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">This research on Quantum Machine Learning (QML) for anomaly detection in cybersecurity audits addresses critical challenges posed by the growing complexity and scale of cyber threats. By leveraging quantum-enhanced models such as Quantum Principal Component Analysis (QPCA) and Quantum Support Vector Machines (QSVM), the study demonstrates how QML can identify subtle anomalies in high-dimensional data with greater speed and precision than classical methods. The findings highlight QML\u2019s potential to revolutionize threat detection by enabling near-real-time processing of large-scale datasets, such as those encountered in IoT networks and critical infrastructure systems.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"background-color: transparent; color: #000000; font-family: 'Times New Roman', serif; font-size: 12pt; white-space-collapse: preserve;\">\u00a0It emphasizes QML\u2019s role in addressing zero-day attacks, insider threats, and Advanced Persistent Threats (APTs) by capturing complex, non-linear relationships within entangled quantum states. This advancement could significantly reduce the financial, operational, and reputational impacts of cyber incidents. By supporting continuous auditing rather than periodic reviews, QML offers a proactive approach to cybersecurity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-160521d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"160521d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2102bad\" data-id=\"2102bad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b3c7a1 elementor-widget elementor-widget-heading\" data-id=\"3b3c7a1\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i1-11Aa\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">About The Author<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfd643a elementor-widget elementor-widget-text-editor\" data-id=\"cfd643a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Mr. Venkatasubramanian Ganapathy, M.Phil., B.Ed., M. Com, D.P.C.S.<\/span><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> is a faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI), Chennai, Tamil Nadu, Bharat. He has over 18+ years\u2019 academic experience and 9 years corporate experience. He has presented and published many research papers in International and National Conferences and journals. His area of interest are Auditing, Finance and Accounting, Taxation, AI, ML, DL, Cloud Computing, IoT, Osmotic Computing, Blockchain Technology, Big Data Analytics, Python, RDBMS, Serverless Computing, Forensic Auditing, Cyber Security, Quantum Computing etc., He has been recognized with many Awards. His focus on implementation of latest technologies in his field.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53a7736 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53a7736\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32ddcb1\" data-id=\"32ddcb1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b200595 elementor-widget elementor-widget-heading\" data-id=\"b200595\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite this Article<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7807320 elementor-widget elementor-widget-text-editor\" data-id=\"7807320\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">APA 7th Style:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> Ganapathy, V. (2025). Quantum machine learning for anomaly detection in cyber security audits. <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">4<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(01), 127\u2013154. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.59231\/SARI7784\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #0563c1; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.59231\/SARI7784<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Chicago 17th Style:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> Ganapathy, Venkatasubramanian. &#8220;Quantum Machine Learning for Anomaly Detection in Cyber Security Audits.&#8221; <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> 4, no. 1 (2025): 127\u2013154. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.59231\/SARI7784\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #0563c1; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.59231\/SARI7784<\/span><\/a><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">MLA 9th Style:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> Ganapathy, Venkatasubramanian. &#8220;Quantum Machine Learning for Anomaly Detection in Cyber Security Audits.&#8221; <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, vol. 4, no. 1, 2025, pp. 127-154, <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.59231\/SARI7784\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #0563c1; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.59231\/SARI7784<\/span><\/a><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-32a1167 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32a1167\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-18b9079\" data-id=\"18b9079\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f103ca elementor-widget elementor-widget-heading\" data-id=\"7f103ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Statements &amp; Declarations:\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3780466 elementor-widget elementor-widget-text-editor\" data-id=\"3780466\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Review Method:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> This article underwent a double-blind peer-review process by two independent external experts in Quantum Computing and Information Systems Audit to ensure the technical validity of the quantum algorithms and the practical relevance to cybersecurity auditing standards.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Competing Interests:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> The author (Venkatasubramanian Ganapathy) declares that there are no financial, personal, or professional conflicts of interest that could have inappropriately influenced the research findings or the technical assessments presented in this study.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Funding:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> This research was conducted as part of the author&#8217;s academic and professional activities at the Southern India Regional Council of the ICAI (SIRC of ICAI). No specific external grants or commercial funding were received for this work.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Data Availability:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> The analysis is based on theoretical frameworks and simulated performance benchmarks of Quantum Support Vector Machines (QSVM) and Quantum Neural Networks (QNN) in detecting network intrusions. Technical details regarding the quantum circuits and algorithmic complexity are included in the manuscript.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">License:<\/span> <span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Quantum Machine Learning for Anomaly Detection in Cyber Security Audits<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> \u00a9 2025 by Venkatasubramanian Ganapathy is licensed under <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">CC BY-NC-ND 4.0<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman',serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">. This work is published by the International Council for Education Research and Training (ICERT).<\/span><\/p><p><span id=\"docs-internal-guid-63f00794-7fff-3ecb-f9f8-f2656fb5e0e6\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Ethics Approval:<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"> As this study is a theoretical and computational review of algorithms and does not involve direct experimentation on human participants, it was deemed exempt from formal ethical review by the Institutional Research Committee.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f17965a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f17965a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14fb1c1\" data-id=\"14fb1c1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4f2f48 elementor-widget elementor-widget-heading\" data-id=\"a4f2f48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">References<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5debcbd elementor-widget elementor-widget-text-editor\" data-id=\"5debcbd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><ol style=\"margin-top: 0; margin-bottom: 0; padding-inline-start: 48px;\"><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: underline; text-decoration-skip-ink: none; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: none; vertical-align: baseline; text-wrap-mode: wrap;\">Blog of the Fraunhofer institute for applied and integrated security AISEC. <\/span><a style=\"text-decoration-line: none;\" href=\"https:\/\/www.cybersecurity.blog.aisec.fraunhofer.de\/en\/\"><span style=\"font-size: 12pt; color: #0000ff; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-skip-ink: none; vertical-align: baseline; text-wrap-mode: wrap;\">https:\/\/www.cybersecurity.blog.aisec.fraunhofer.de\/en\/<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">Dixit, A. (2024). Navigating the Future: Exploring the strategic integration of artificial intelligence in contemporary management practices. <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">03<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">(02), 295\u2013303. https:\/\/doi.org\/10.59231\/sari7705<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">Tiwari, A. K. (2024b). Relevance of innovations in educational research technology of universities. <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">Edumania-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">02<\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">(01), 235\u2013254. https:\/\/doi.org\/10.59231\/edumania\/9029<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">arXiv \u2013 (Cornell University) anomaly detection using QML. <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; text-wrap-mode: wrap;\">https:\/\/arxiv.org\/search\/?query=anomaly+detection+using+QML&amp;searchtype=all&amp;source=header<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: 'Times New Roman', serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">IBM. Quantum. <\/span><span style=\"font-size: 12pt; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; text-wrap-mode: wrap;\">https:\/\/securityintelligence.com\/tag\/quantum-computing\/page\/3\/?mhsrc=ibmsearch_a&amp;mhq=quantum%20computing%20comes%20to%20the%20cloud&amp;_gl=1%2Ai68vs0%2A_ga%2AODk1MDE4MzYyLjE3MzAxOTczMjA.%2A_ga_FYECCCS21D%2AMTczMDE5NzMxOS4xLjEuMTczMDE5NzQ2Mi4wLjAuMA<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">International Information and Engineering Technology Association. <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; text-wrap-mode: wrap;\">https:\/\/www.iieta.org\/<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; white-space: pre; margin-left: -18pt; padding-left: 3.25pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; text-wrap-mode: wrap;\">NSF (National Science Foundation) public access repository (NSF-PAR). <\/span><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; text-wrap-mode: wrap;\">https:\/\/par.nsf.gov\/contact<\/span><\/p><\/li><\/ol><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0ffce9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b0ffce9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28ed478\" data-id=\"28ed478\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9850f00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9850f00\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21e0816\" data-id=\"21e0816\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c66bab8 elementor-align-right elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"c66bab8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/icert.org.in\/index.php\/sodh-sari-vol-4-issue-1\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Shodh Sari-An International Multidisciplinary Journal Vol-04, Issue-01 (Jan-Mar 2025) An International scholarly\/ academic journal, peer-reviewed\/ refereed journal, ISSN : 2959-1376 Quantum Machine Learning for Anomaly Detection in Cyber Security Audits Ganapathy, Venkatasubramanian Faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI), Chennai, Tamil Nadu, Bharat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10106,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-10526","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/pages\/10526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/comments?post=10526"}],"version-history":[{"count":12,"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/pages\/10526\/revisions"}],"predecessor-version":[{"id":31660,"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/pages\/10526\/revisions\/31660"}],"up":[{"embeddable":true,"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/pages\/10106"}],"wp:attachment":[{"href":"https:\/\/icert.org.in\/index.php\/wp-json\/wp\/v2\/media?parent=10526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}