
Title:
Deep learning approaches to cloud security
Author:
Rathore, Pramod Singh, 1988- editor.
ISBN:
9781119760504
9781119760542
9781119760535
Physical Description:
1 online resource.
Series:
Advances in cyber security
Advances in cyber security.
Contents:
Biometric Identification Using Deep Learning for Advance Cloud Security / Navani Siroya, Manju Mandot -- Privacy in Multi-Tenancy Cloud Using Deep Learning / Shweta Solanki, Prafull Narooka -- Emotional Classification Using EEG Signals and Facial Expression: A Survey / S J Savitha, M Paulraj, K Saranya -- Effective and Efficient Wind Power Generation Using Bifarious Solar PV System / R Amirtha Katesa Sai Raj, M Arun Kumar, S Dinesh, U Harisudhan, R Uthirasamy -- Background Mosaicing Model for Wide Area Surveillance System / E Komagal -- Prediction of CKD Stage 1 Using Three Different Classifiers / K Thamizharasan, P Yamini, A Shimola, S Sudha -- Classification of MRI Images to Aid in Diagnosis of Neurological Disorder Using SVM / Selvaraj Phavithra, MS Sruthi, M Sridaran, Christ MC Jobin -- Convolutional Networks / Simran Kaur, Rashmi Agrawal -- Categorization of Cloud Computing & Deep Learning / Disha Shrmali -- Smart Load Balancing in Cloud Using Deep Learning / Astha Parihar, Shweta Sharma -- Biometric Identification for Advanced Cloud Security / Yojna khandelwal, Kapil Chauhan -- Application of Deep Learning in Cloud Security / Jain Jaya -- Real Time Cloud Based Intrusion Detection / Ekta Bafna -- Applications of Deep Learning in Cloud Security / Disha Shrmali, Shweta Sharma.
Abstract:
DEEP LEARNING APPROACHES TO CLOUD SECURITY Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts. Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. However, applying deep learning techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to visualization. This book provides state of the art approaches of deep learning in these areas, including areas of detection and prediction, as well as future framework development, building service systems and analytical aspects. In all these topics, deep learning approaches, such as artificial neural networks, fuzzy logic, genetic algorithms, and hybrid mechanisms are used. This book is intended for dealing with modeling and performance prediction of the efficient cloud security systems, thereby bringing a newer dimension to this rapidly evolving field. This groundbreaking new volume presents these topics and trends of deep learning, bridging the research gap, and presenting solutions to the challenges facing the engineer or scientist every day in this area. Whether for the veteran engineer or the student, this is a must-have for any library. Deep Learning Approaches to Cloud Security: Is the first volume of its kind to go in-depth on the newest trends and innovations in cloud security through the use of deep learning approaches Covers these important new innovations, such as AI, data mining, and other evolving computing technologies in relation to cloud security Is a useful reference for the veteran computer scientist or engineer working in this area or an engineer new to the area, or a student in this area Discusses not just the practical applications of these technologies, but also the broader concepts and theory behind how these deep learning tools are vital not just to cloud security, but society as a whole Audience: Computer scientists, scientists and engineers working with information technology, design, network security, and manufacturing, researchers in computers, electronics, and electrical and network security, integrated domain, and data analytics, and students in these areas.
Local Note:
John Wiley and Sons
Added Author:
Electronic Access:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542Copies:
Available:*
Library | Material Type | Item Barcode | Shelf Number | Status | Item Holds |
|---|---|---|---|---|---|
Searching... | E-Book | 597294-1001 | QA76.585 | Searching... | Searching... |
