Abstract
Cybersecurity challenges have become increasingly complex and widespread, and the risks associated with these problems are substantial, affecting thousands of individuals and organisations and being crucial to national security. As cybercriminals have become increasingly adept at utilizing advanced methods to exploit system vulnerabilities, there has never been a more pressing need for reliable threat detection and response systems. This study proposes a framework that uses quantum transfer learning to enhance cybersecurity threat detection by leveraging multiple datasets, including UNSW-NB15, CICIDS2017, CSE-CIC-IDS2018, and TON_IoT. The framework focuses on improving the accuracy and efficiency of existing machine learning methods for cyber threat detection by employing quantum computing techniques for feature extraction and analysis. The pre-processing of the UNSW-NB15 dataset, the extraction of quantum features using PennyLane, and the training of the deep learning model with TensorFlow are the steps in the workflow of this study. Finally, the model is fine-tuned through transfer learning on other datasets, resulting in improvements in detection accuracy. This study shows that our quantum-enhanced model attains an accuracy of 83% on UNSW-NB15, 91% on the combined CICIDS2017 and CSE-CIC-IDS2018 datasets, and 86% on the TON_IoT dataset, demonstrating the potential of quantum computing and its use in the field of cybersecurity. Unlike fully quantum classifiers, our approach applies quantum transformations only at the feature-extraction stage, thereby creating a hybrid classical-quantum workflow that enhances transfer-learning performance across multiple cybersecurity datasets.
Data availability
Data is provided within the manuscript.
References
Ferrag, M. A., Alwahedi, F. & Battah, A. et al. Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities. Int. Things Cyber-Phys. Syst. 5, 1–46 (2025).
Al Siam, A., Hassan, M. M. & Bhuiyan, T. Artificial intelligence for cybersecurity: A state of the art. In: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 1–7 (2025).
Khanna, S. Ai in cybersecurity: A comprehensive review of threat detection and prevention mechanisms. Int. J. Sustain. Dev. field of IT 17(17) (2025).
Kokaji, A. & Goto, A. An analysis of economic losses from cyberattacks: based on input-output model and production function. J. Econ. Struct. 11(1), 34 (2022).
Li, J., Xiao, W. & Zhang, C. Data security crisis in universities: identification of key factors affecting data breach incidents. Hum. Soc. Sci. Commun. 10(1), 1–18 (2023).
Subramanian, G. & Chinnadurai, M. Hybrid quantum enhanced federated learning for cyber attack detection. Sci. Rep. 14(1), 32038 (2024).
Tao, X., Liu, J. & Yu, Y. et al. An insider threat detection method based on improved test-time training model. High-Confidence Comput. 5, 100283 (2025).
Qawasmeh, S. A. D., AlQahtani, A. A. S. & Khan, M. K. Navigating cybersecurity training: A comprehensive review. Comput. Electrical Eng. 123, 110097 (2025).
Sarker, I. H. Introduction to ai-driven cybersecurity and threat intelligence. In: AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability. Springer, 3–19 (2024).
Mutalib, N. H. A. et al. Explainable deep learning approach for advanced persistent threats (apts) detection in cybersecurity: a review. Artif. Intell. Rev. 57(11), 297 (2024).
Ejeofobiri, C. et al. The role of artificial intelligence in enhancing cybersecurity: A comprehensive review of threat detection, response, and prevention techniques. Int. J. Sci. Res. Arch. 13(02), 310–316 (2024).
Raji, A. et al. Integrating artificial intelligence, machine learning, and data analytics in cybersecurity: A holistic approach to advanced threat detection and response. World J. Adv. Res. Rev. 20(3), 2005–2024 (2023).
Dash, B., Ansari, M. F. & Sharma, P. et al. Threats and opportunities with ai-based cyber security intrusion detection: a review. Int. J. Software Eng. & Appl. (IJSEA). 13(5) (2022).
Kavitha, D. & Thejas, S. Ai enabled threat detection: Leveraging artificial intelligence for advanced security and cyber threat mitigation. IEEE Access. 12, 173127–173136 (2024).
Thaljaoui, A. Intelligent network intrusion detection system using optimized deep cnn-lstm with unsw-nb15. Int. J. Inf. Technol. 1–17 (2025).
Amiri, A., Ghaffarnia, A. & Sakib, S. K. et al. Focalca: A hybrid-convolutional-attention encoder for intrusion detection on unsw-nb15 achieving high accuracy without data balancing. In: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 1–8 (2025).
Hassanin, M. et al. Pllm-cs: Pre-trained large language model (llm) for cyber threat detection in satellite networks. Ad Hoc Networks 166, 103645 (2025).
Shoukat, S. et al. Trust my ids: An explainable ai integrated deep learning-based transparent threat detection system for industrial networks. Comput. & Secur. 149, 104191 (2025).
Abdelaziz, M. T. et al. Enhancing network threat detection with random forest-based nids and permutation feature importance. J. Network Syst. Manag. 33(1), 2 (2025).
Luqman, M. et al. Intelligent parameter-based in-network ids for iot using unsw-nb15 and bot-iot datasets. J. Franklin Institute 362(1), 107440 (2025).
Thiagarajan, G. & Mahalingam, S. Advanced deep learning techniques for anomaly detection in cloud computing traffic: Methods and applications. Available at SSRN 5082090 (2025).
Rawat, K. S. & Sharma, T. A leap from theory to reality: knowledge visualization of quantum computing. IEEE Trans. Eng. Manag. 71, 14861-14877 (2024).
Rawat, K. S. & Yadav, M. Analyzing quantum computing applications across key scientific domains using trends and visual analytics. Arch. Comput. Methods Eng. 1–32 (2025).
Sahu, K. & Kumar, R. Telemedicine: how to achieve interoperability without compromising data security. British J. Healthcare Manag. 31(1), 1–5 (2025).
Sahu, K. & Kumar, R. A secure decentralised finance framework. Comput. Fraud & Secur. 2024(3), (2024).
Kumar, R., Khan, S. A. & Alharbe, N. et al. Code of silence: cyber security strategies for combating deepfake disinformation.Comput. Fraud & Secur. 2024(4), (2024).
Cai, J., Qi, Y. & Liu, S. et al. A residual joint antenna network for joint transmit-receive antenna subset selection in mimo systems. IEEE Trans. Antennas Propag. 73, 8366–8371 (2025).
Zhu, S., Cai, J. & Xiong, R. et al. Singular pooling: a spectral pooling paradigm for second-trimester prenatal level ii ultrasound standard fetal plane identification. IEEE Trans. Circuits Syst. Video Technol. 35, 12508–12523 (2025).
Funding
This research is supported by a grant (No. CRPG-25-3285) under the Cybersecurity Research and Innovation Pioneers Initiative, provided by the National Cybersecurity Authority (NCA) in the Kingdom of Saudi Arabia. The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA, for funding this research work through the project number “NBU-FFR-2026-2443-01” and the Deanship of Research and Graduate Studies at King Khalid University for funding this work through the Large Research Project under grant number RGP.2/256/46.
Author information
Authors and Affiliations
Contributions
S. A.: Conception and design of study, Writing - original draft, Writing - review & editing, Methodology, Project Administration, Visualisation. M. A.: Acquisition of data, Analysis and/or interpretation of data, Writing - original draft, Writing - review & editing. N. K.: Analysis and/or interpretation of data, Writing - original draft, Writing - review & editing. A.A.: Conception and design of study, Acquisition of data, Analysis and/or interpretation of data, Writing - original draft. J.B.: Writing - original draft, Writing - review & editing, Methodology, Validation, Supervision. A.A.H: Analysis and/or interpretation of data, Writing - original draft, Methodology, Validation. S.A.: Writing - original draft, Acquisition of data, Writing - review & editing, Methodology.
Corresponding authors
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Alsubai, S., Ayari, M., Kryvinska, N. et al. Quantum transfer learning for cross-domain cybersecurity threat detection and categorization. Sci Rep (2026). https://doi.org/10.1038/s41598-026-40634-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-40634-z