{"title":"Hybrid Cloud: A New Paradigm in Cloud Computing","authors":"M. Deb, Abantika Choudhury","doi":"10.1002/9781119764113.ch1","DOIUrl":"https://doi.org/10.1002/9781119764113.ch1","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric Key and Artificial Neural Network With Mealy Machine: A Neoteric Model of Cryptosystem for Cloud Security","authors":"Anirban Bhowmik, Sunil Karforma, Joydeep Dey","doi":"10.1002/9781119764113.ch5","DOIUrl":"https://doi.org/10.1002/9781119764113.ch5","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of Differentially Expressed Glycan Structure of H1N1 Virus Using Unsupervised Learning Framework","authors":"Shillpi Mishrra","doi":"10.1002/9781119764113.ch2","DOIUrl":"https://doi.org/10.1002/9781119764113.ch2","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent System for Securing Network From Intrusion Detection and Prevention of Phishing Attack Using Machine Learning Approaches","authors":"Sumit Banik, Sagar Banik, Anupam Mukherjee","doi":"10.1002/9781119764113.ch10","DOIUrl":"https://doi.org/10.1002/9781119764113.ch10","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI, ML, & Robotics in iSchools: An Academic Analysis for an Intelligent Societal Systems","authors":"P. K. Paul","doi":"10.1002/9781119764113.ch19","DOIUrl":"https://doi.org/10.1002/9781119764113.ch19","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Intrusion Detection System on Various Datasets Using Machine Learning Techniques","authors":"Debraj Chatterjee","doi":"10.1002/9781119764113.ch6","DOIUrl":"https://doi.org/10.1002/9781119764113.ch6","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The State‐of‐the‐Art in Zero‐Knowledge Authentication Proof for Cloud","authors":"Priyankar Ghosh","doi":"10.1002/9781119764113.ch8","DOIUrl":"https://doi.org/10.1002/9781119764113.ch8","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122884313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection of Certain Cancer Mediating Genes Using a Hybrid Model Logistic Regression Supported by Principal Component Analysis (PC‐LR)","authors":"S. Hazra, Alia Nikhat Khurshid, Akriti","doi":"10.1002/9781119764113.ch3","DOIUrl":"https://doi.org/10.1002/9781119764113.ch3","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Security Using Honeypot Network and Blockchain: A Review","authors":"Smarta Sangui, Swarup Kr Ghosh","doi":"10.1002/9781119764113.ch11","DOIUrl":"https://doi.org/10.1002/9781119764113.ch11","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"You Are Known by Your Mood: A Text‐Based Sentiment Analysis for Cloud Security","authors":"A. Roy, P. Roy","doi":"10.1002/9781119764113.ch7","DOIUrl":"https://doi.org/10.1002/9781119764113.ch7","url":null,"abstract":"","PeriodicalId":213746,"journal":{"name":"Machine Learning Techniques and Analytics for Cloud Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}