Machine Learning Techniques and Analytics for Cloud Security. Группа авторов

Читать онлайн книгу.

Machine Learning Techniques and Analytics for Cloud Security - Группа авторов


Скачать книгу
16.2 Microsoft Azure—The Security Infrastructure 16.3 Data Encryption 16.4 Azure Cloud Security Architecture 16.5 Azure Architecture 16.6 Features of Azure 16.7 Common Azure Security Features 16.8 Conclusion References 17 Nutanix Hybrid Cloud From Security Perspective 17.1 Introduction 17.2 Growth of Nutanix 17.3 Introductory Concepts 17.4 Nutanix Hybrid Cloud 17.5 Reinforcing AHV and Controller VM 17.6 Disaster Management and Recovery 17.7 Security and Policy Management on Nutanix Hybrid Cloud 17.8 Network Security and Log Management 17.9 Conclusion References

      9  Part V POLICY ASPECTS 18 A Data Science Approach Based on User Interactions to Generate Access Control Policies for Large Collections of Documents 18.1 Introduction 18.2 Related Work 18.3 Network Science Theory 18.4 Approach to Spread Policies Using Networks Science 18.5 Evaluation 18.6 Conclusions References 19 AI, ML, & Robotics in iSchools: An Academic Analysis for an Intelligent Societal Systems 19.1 Introduction 19.2 Objective 19.3 Methodology 19.4 Artificial Intelligence, ML, and Robotics: An Overview 19.5 Artificial Intelligence, ML, and Robotics as an Academic Program: A Case on iSchools—North American Region 19.6 Suggestions 19.7 Motivation and Future Works 19.8 Conclusion References

      10  Index

      11  End User License Agreement

      List of Figures

      1 Chapter 1Figure 1.1 General architecture of hybrid cloud.Figure 1.2 Market trend of hybrid cloud [14].

      2 Chapter 2Figure 2.1 Flowchart of the methodology.Figure 2.2 K-means cluster analysis of Influenza A (H1N1) non-infected human.Figure 2.3 K-means cluster analysis of Influenza A (H1N1) infected human.Figure 2.4 K-means cluster analysis of Influenza A (H1N1) infected human.Figure 2.5 K-means cluster analysis of Influenza A (H1N1) infected human.Figure 2.6 Hierarchical cluster analysis of Influenza A (H1N1) infected human.Figure 2.7 Hierarchical cluster analysis of Influenza A (H1N1) infected human.Figure 2.8 Hierarchical cluster analysis of Influenza A (H1N1) infected human.Figure 2.9 Fuzzy c-means cluster analysis of Influenza A (H1N1) infected human.Figure 2.10 Fuzzy c-means clustering algorithm of Influenza A (H1N1) infected hu...Figure 2.11 Fuzzy c-means clustering algorithm of Influenza A (H1N1) infected hu...Figure 2.12 Concepts of type-I and type-II error in terms set.Figure 2.13 Performance measurements of the F-score, balance accuracy, and Matth...Figure 2.14 Block diagram of glycan cloud.

      3 Chapter 3Figure 3.1 Sigmoid curve.Figure 3.2 Flowchart of PC-LR algorithm.Figure 3.3 FN, TP, and FP values for colon.Figure 3.4 FN, TP, and FP values for lung.Figure 3.5 F-score for lung and colon using precision.Figure 3.6 F-score for lung and colon dataset using recall.Figure 3.7 F1 score for lung and colon dataset.Figure 3.8 Storing and accessing the data values in Amazon S3.

      4 Chapter 4Figure 4.1 IoT-based smart home automation system.Figure 4.2 Command accepting interface.Figure 4.3 Dataflow diagram for the message, command, and data transfer.Figure 4.4 Block diagram that exhibits the linkage between Uber server and IFTTT...Figure 4.5 Block diagram for Spotify server connection.Figure


Скачать книгу