Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Quantum transfer learning for cross-domain cybersecurity threat detection and categorization
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 23 February 2026

Quantum transfer learning for cross-domain cybersecurity threat detection and categorization

  • Shtwai Alsubai1,
  • Mohamed Ayari2,
  • Natalia Kryvinska3,
  • Ahmad Almadhor4,
  • Jamel Baili5,
  • Abdullah Al Hejaili6 &
  • …
  • Sidra Abbas7 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Computational biology and bioinformatics
  • Engineering
  • Mathematics and computing

Abstract

Cybersecurity challenges have become increasingly complex and widespread, and the risks associated with these problems are substantial, affecting thousands of individuals and organisations and being crucial to national security. As cybercriminals have become increasingly adept at utilizing advanced methods to exploit system vulnerabilities, there has never been a more pressing need for reliable threat detection and response systems. This study proposes a framework that uses quantum transfer learning to enhance cybersecurity threat detection by leveraging multiple datasets, including UNSW-NB15, CICIDS2017, CSE-CIC-IDS2018, and TON_IoT. The framework focuses on improving the accuracy and efficiency of existing machine learning methods for cyber threat detection by employing quantum computing techniques for feature extraction and analysis. The pre-processing of the UNSW-NB15 dataset, the extraction of quantum features using PennyLane, and the training of the deep learning model with TensorFlow are the steps in the workflow of this study. Finally, the model is fine-tuned through transfer learning on other datasets, resulting in improvements in detection accuracy. This study shows that our quantum-enhanced model attains an accuracy of 83% on UNSW-NB15, 91% on the combined CICIDS2017 and CSE-CIC-IDS2018 datasets, and 86% on the TON_IoT dataset, demonstrating the potential of quantum computing and its use in the field of cybersecurity. Unlike fully quantum classifiers, our approach applies quantum transformations only at the feature-extraction stage, thereby creating a hybrid classical-quantum workflow that enhances transfer-learning performance across multiple cybersecurity datasets.

Data availability

Data is provided within the manuscript.

References

  1. Ferrag, M. A., Alwahedi, F. & Battah, A. et al. Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities. Int. Things Cyber-Phys. Syst. 5, 1–46 (2025).

  2. Al Siam, A., Hassan, M. M. & Bhuiyan, T. Artificial intelligence for cybersecurity: A state of the art. In: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 1–7 (2025).

  3. Khanna, S. Ai in cybersecurity: A comprehensive review of threat detection and prevention mechanisms. Int. J. Sustain. Dev. field of IT 17(17) (2025).

  4. Kokaji, A. & Goto, A. An analysis of economic losses from cyberattacks: based on input-output model and production function. J. Econ. Struct. 11(1), 34 (2022).

    Google Scholar 

  5. Li, J., Xiao, W. & Zhang, C. Data security crisis in universities: identification of key factors affecting data breach incidents. Hum. Soc. Sci. Commun. 10(1), 1–18 (2023).

    Google Scholar 

  6. Subramanian, G. & Chinnadurai, M. Hybrid quantum enhanced federated learning for cyber attack detection. Sci. Rep. 14(1), 32038 (2024).

    Google Scholar 

  7. Tao, X., Liu, J. & Yu, Y. et al. An insider threat detection method based on improved test-time training model. High-Confidence Comput. 5, 100283 (2025).

  8. Qawasmeh, S. A. D., AlQahtani, A. A. S. & Khan, M. K. Navigating cybersecurity training: A comprehensive review. Comput. Electrical Eng. 123, 110097 (2025).

    Google Scholar 

  9. Sarker, I. H. Introduction to ai-driven cybersecurity and threat intelligence. In: AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability. Springer, 3–19 (2024).

  10. Mutalib, N. H. A. et al. Explainable deep learning approach for advanced persistent threats (apts) detection in cybersecurity: a review. Artif. Intell. Rev. 57(11), 297 (2024).

    Google Scholar 

  11. Ejeofobiri, C. et al. The role of artificial intelligence in enhancing cybersecurity: A comprehensive review of threat detection, response, and prevention techniques. Int. J. Sci. Res. Arch. 13(02), 310–316 (2024).

    Google Scholar 

  12. Raji, A. et al. Integrating artificial intelligence, machine learning, and data analytics in cybersecurity: A holistic approach to advanced threat detection and response. World J. Adv. Res. Rev. 20(3), 2005–2024 (2023).

    Google Scholar 

  13. Dash, B., Ansari, M. F. & Sharma, P. et al. Threats and opportunities with ai-based cyber security intrusion detection: a review. Int. J. Software Eng. & Appl. (IJSEA). 13(5) (2022).

  14. Kavitha, D. & Thejas, S. Ai enabled threat detection: Leveraging artificial intelligence for advanced security and cyber threat mitigation. IEEE Access. 12, 173127–173136 (2024).

  15. Thaljaoui, A. Intelligent network intrusion detection system using optimized deep cnn-lstm with unsw-nb15. Int. J. Inf. Technol. 1–17 (2025).

  16. Amiri, A., Ghaffarnia, A. & Sakib, S. K. et al. Focalca: A hybrid-convolutional-attention encoder for intrusion detection on unsw-nb15 achieving high accuracy without data balancing. In: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 1–8 (2025).

  17. Hassanin, M. et al. Pllm-cs: Pre-trained large language model (llm) for cyber threat detection in satellite networks. Ad Hoc Networks 166, 103645 (2025).

    Google Scholar 

  18. Shoukat, S. et al. Trust my ids: An explainable ai integrated deep learning-based transparent threat detection system for industrial networks. Comput. & Secur. 149, 104191 (2025).

    Google Scholar 

  19. Abdelaziz, M. T. et al. Enhancing network threat detection with random forest-based nids and permutation feature importance. J. Network Syst. Manag. 33(1), 2 (2025).

    Google Scholar 

  20. Luqman, M. et al. Intelligent parameter-based in-network ids for iot using unsw-nb15 and bot-iot datasets. J. Franklin Institute 362(1), 107440 (2025).

    Google Scholar 

  21. Thiagarajan, G. & Mahalingam, S. Advanced deep learning techniques for anomaly detection in cloud computing traffic: Methods and applications. Available at SSRN 5082090 (2025).

  22. Rawat, K. S. & Sharma, T. A leap from theory to reality: knowledge visualization of quantum computing. IEEE Trans. Eng. Manag. 71, 14861-14877 (2024).

  23. Rawat, K. S. & Yadav, M. Analyzing quantum computing applications across key scientific domains using trends and visual analytics. Arch. Comput. Methods Eng. 1–32 (2025).

  24. Sahu, K. & Kumar, R. Telemedicine: how to achieve interoperability without compromising data security. British J. Healthcare Manag. 31(1), 1–5 (2025).

    Google Scholar 

  25. Sahu, K. & Kumar, R. A secure decentralised finance framework. Comput. Fraud & Secur. 2024(3), (2024).

  26. Kumar, R., Khan, S. A. & Alharbe, N. et al. Code of silence: cyber security strategies for combating deepfake disinformation.Comput. Fraud & Secur. 2024(4), (2024).

  27. Cai, J., Qi, Y. & Liu, S. et al. A residual joint antenna network for joint transmit-receive antenna subset selection in mimo systems. IEEE Trans. Antennas Propag. 73, 8366–8371 (2025).

  28. Zhu, S., Cai, J. & Xiong, R. et al. Singular pooling: a spectral pooling paradigm for second-trimester prenatal level ii ultrasound standard fetal plane identification. IEEE Trans. Circuits Syst. Video Technol. 35, 12508–12523 (2025).

Download references

Funding

This research is supported by a grant (No. CRPG-25-3285) under the Cybersecurity Research and Innovation Pioneers Initiative, provided by the National Cybersecurity Authority (NCA) in the Kingdom of Saudi Arabia. The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA, for funding this research work through the project number “NBU-FFR-2026-2443-01” and the Deanship of Research and Graduate Studies at King Khalid University for funding this work through the Large Research Project under grant number RGP.2/256/46.

Author information

Authors and Affiliations

  1. College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, 16273, AlKharj, Saudi Arabia

    Shtwai Alsubai

  2. Department of Information Technology, Faculty of Computing and Information Technology, Northern Border University, 73222, Arar, Saudi Arabia

    Mohamed Ayari

  3. Department of Information Management and Business Systems, Faculty of Management, Comenius University Bratislava, Odbojarov 10, 82005, Bratislava 25, Slovakia

    Natalia Kryvinska

  4. Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, 72388, Sakaka, Saudi Arabia

    Ahmad Almadhor

  5. Department of Computer Engineering, College of Computer Science, King Khalid University, 61413, Abha, Saudi Arabia

    Jamel Baili

  6. Faculty of Computers & Information Technology, Computer Science Department, University of Tabuk, 71491, Tabuk, Saudi Arabia

    Abdullah Al Hejaili

  7. Department of Computer Science, COMSATS University Islamabad, Sahiwal, 57000, Pakistan

    Sidra Abbas

Authors
  1. Shtwai Alsubai
    View author publications

    Search author on:PubMed Google Scholar

  2. Mohamed Ayari
    View author publications

    Search author on:PubMed Google Scholar

  3. Natalia Kryvinska
    View author publications

    Search author on:PubMed Google Scholar

  4. Ahmad Almadhor
    View author publications

    Search author on:PubMed Google Scholar

  5. Jamel Baili
    View author publications

    Search author on:PubMed Google Scholar

  6. Abdullah Al Hejaili
    View author publications

    Search author on:PubMed Google Scholar

  7. Sidra Abbas
    View author publications

    Search author on:PubMed Google Scholar

Contributions

S. A.: Conception and design of study, Writing - original draft, Writing - review & editing, Methodology, Project Administration, Visualisation. M. A.: Acquisition of data, Analysis and/or interpretation of data, Writing - original draft, Writing - review & editing. N. K.: Analysis and/or interpretation of data, Writing - original draft, Writing - review & editing. A.A.: Conception and design of study, Acquisition of data, Analysis and/or interpretation of data, Writing - original draft. J.B.: Writing - original draft, Writing - review & editing, Methodology, Validation, Supervision. A.A.H: Analysis and/or interpretation of data, Writing - original draft, Methodology, Validation. S.A.: Writing - original draft, Acquisition of data, Writing - review & editing, Methodology.

Corresponding authors

Correspondence to Mohamed Ayari or Sidra Abbas.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alsubai, S., Ayari, M., Kryvinska, N. et al. Quantum transfer learning for cross-domain cybersecurity threat detection and categorization. Sci Rep (2026). https://doi.org/10.1038/s41598-026-40634-z

Download citation

  • Received: 04 January 2026

  • Accepted: 13 February 2026

  • Published: 23 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-40634-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Quantum transfer learning
  • Cybersecurity
  • Threat detection
  • UNSW-NB15
  • CICIDS2017
  • CSE-CIC-IDS2018
  • TON_IoT
  • Quantum feature extraction
  • Deep learning
  • Imbalanced data
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics