Machine Learning Techniques and Analytics for Cloud Security. Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Machine Learning Techniques and Analytics for Cloud Security - Группа авторов страница 5
5 Chapter 6Table 6.1 Comparative table of NIDS and HIDS.Table 6.2 Comparative table of signature-based and anomaly-based IDS.Table 6.3 Some of the works pertaining to IDS in recent years.Table 6.4 (a) The accuracies yielded through various state-of-the-art classifier...Table 6.4 (b) The accuracies yielded through various state-of-the-art classifier...Table 6.4 (c) The accuracies yielded through various state-of-the-art classifier...Table 6.5 The accuracies yielded through various state-of-the-art classifiers im...
6 Chapter 7Table 7.1 Performance in different indexes.
7 Chapter 8Table 8.1 Comparative study.
8 Chapter 9Table 9.1 Mean of mean accuracies of different classifiers in k-fold cross-valid...Table 9.2 Mean of mean F1 scores of different classifiers in k-fold cross-valida...Table 9.3 Performance comparison with contemporary works.
9 Chapter 10Table 10.1 Model comparison.Table 10.2 Dataset attributes and its description of phishing URLs.Table 10.3 Dataset attributes and its description of URLs.Table 10.4 Comparison of the parameter values for different models.Table 10.5 Comparison of the various models for its metrics.Table 10.6 Summary.Table 10.7 ANOVA.Table 10.8 Summary.Table 10.9 ANOVA.Table 10.10 Descriptive statistics.
10 Chapter 11Table 11.1 List of recent studies on the improvement of honeypots in the cloud.Table 11.2 List of recent studies application of blockchain for security in the ...Table 11.3 Honeypots for cloud security analysis.Table 11.4 Blockchain for cloud security analysis.
11 Chapter 12Table 12.1 Threats faced in cloud computing.Table 12.2 Attacks faced in cloud computing.Table 12.3 Supervised learning techniques with the highest accuracy.Table 12.4 Unsupervised learning techniques with the highest accuracy.Table 12.5 Hybrid Learning Techniques with the highest accuracy.Table 12.6 Supervised learning analysis.Table 12.7 Unsupervised learning analysis.Table 12.8 Hybrid learning analysis.
12 Chapter 13Table 13.1 Types and examples of five bugs generated methods [26].Table 13.2 Instances of original and adversarial sentences [27].Table 13.3 Different transformer functions with results [29].Table 13.4 Nearest neighbor words based on cosine similarity when hotflip is app...Table 13.5 Comparison of various attacks using TextAttack framework.Table 13.6 Sample output from various text attacks during execution.
13 Chapter 14Table 14.1 Performance comparison (N is exported data item).Table 14.2 Benchmark of co-residence (two files) [26].
14 Chapter 15Table 15.1 Responsibility division across SaaS, PaaS, and IaaS (source: BigComme...Table 15.2 Basic permission levels.Table 15.3 The core of Google Cloud Platform.Table 15.4 Common terminology between Amazon Web Services, Microsoft Azure, and ...
15 Chapter 16Table 16.1 Types of encryption keys.
16 Chapter 17Table 17.1 Nutanix Hybrid Cloud Services.
17 Chapter 18Table 18.1 Description of the neighborhood notation used in this work.Table 18.2 Main information obtained from the user-user graph partitioning. The ...Table 18.3 Main results obtained for three sets of random ACPs generated for the...Table 18.4 Relevant results of the accuracy metric calculation in the graph G, w...
18 Chapter 19Table 19.1 List of iSchools registered internationally under the iSchools Organi...Table 19.2 List of iSchools of American regions offering AI, ML, and Robotics pr...Table 19.3 List of iSchools of American regions offering AI, ML, and Robotics pr...Table 19.4 Sample curricula of the PhD with ML, Robotics, etc.Table 19.5 Sample courses of AI, ML, and Robotics programs at Master and Bachelo...
Guide
1 Cover
5 Preface
7 Index
Pages
1 v
2 ii
3 iii
4 iv
5 xix
6 xx
7 xxi
8 xxii
9 xxiii
10 1
11 3
12 4
13 5
14 6
15 7
16 8
17 9
18 10
19 11
20 12
21 13
22 14
23 15
24 16