Machine Learning Techniques and Analytics for Cloud Security. Группа авторов
on id="u84471d6d-6fc7-5ce0-9e33-0b16191dc26a">
Table of Contents
1 Cover
4 Preface
5 Part I CONCEPTUAL ASPECTS ON CLOUD AND APPLICATIONS OF MACHINE LEARNING 1 Hybrid Cloud: A New Paradigm in Cloud Computing 1.1 Introduction 1.2 Hybrid Cloud 1.3 Comparison Among Different Hybrid Cloud Providers 1.4 Hybrid Cloud in Education 1.5 Significance of Hybrid Cloud Post-Pandemic 1.6 Security in Hybrid Cloud 1.7 Use of AI in Hybrid Cloud 1.8 Future Research Direction 1.9 Conclusion References 2 Recognition of Differentially Expressed Glycan Structure of H1N1 Virus Using Unsupervised Learning Framework 2.1 Introduction 2.2 Proposed Methodology 2.3 Result 2.4 Conclusions and Future Work References 3 Selection of Certain Cancer Mediating Genes Using a Hybrid Model Logistic Regression Supported by Principal Component Analysis (PC-LR) 3.1 Introduction 3.2 Related Methods 3.3 Methodology 3.4 Result 3.5 Application in Cloud Domain 3.6 Conclusion References
6
Part II CLOUD SECURITY SYSTEMS USING MACHINE LEARNING TECHNIQUES
4 Cost-Effective Voice-Controlled Real-Time Smart Informative Interface Design With Google Assistance Technology
4.1 Introduction
4.2 Home Automation System
4.3 Literature Review
4.4 Role of Sensors and Microcontrollers in Smart Home Design
4.5 Motivation of the Project
4.6 Smart Informative and Command Accepting Interface
4.7 Data Flow Diagram
4.8 Components of Informative Interface
4.9 Results
4.10 Conclusion
4.11 Future Scope
References
5 Symmetric Key and Artificial Neural Network With Mealy Machine: A Neoteric Model of Cryptosystem for Cloud Security
5.1 Introduction
5.2 Literature Review
5.3 The Problem
5.4 Objectives and Contributions
5.5 Methodology
5.6 Results and Discussions
5.7 Conclusions
References
6 An Efficient Intrusion Detection System on Various Datasets Using Machine Learning Techniques
6.1 Introduction
6.2 Motivation and Justification of the Proposed Work
6.3 Terminology Related to IDS
6.4 Intrusion Attacks on Cloud Environment
6.5 Comparative Studies
6.6 Proposed Methodology
6.7 Result
6.8 Conclusion and Future Scope
References
7 You Are Known by Your Mood: A Text-Based Sentiment Analysis for Cloud Security
7.1 Introduction
7.2 Literature Review
7.3 Essential Prerequisites
7.4 Proposed Model
7.5 Experimental Setup
7.6 Results and Discussions
7.7 Application in Cloud Security
7.8 Conclusion and Future Scope
References
8 The State-of-the-Art in Zero-Knowledge Authentication Proof for Cloud