Читать книгу Deep Learning Approaches to Cloud Security - Группа авторов - Страница 2

Table of Contents

Оглавление

Cover

Title Page

Copyright

Foreword

Preface

1 Biometric Identification Using Deep Learning for Advance Cloud Security 1.1 Introduction 1.2 Techniques of Biometric Identification 1.3 Approaches 1.4 Related Work, A Review 1.5 Proposed Work 1.6 Future Scope 1.7 Conclusion References

2 Privacy in Multi-Tenancy Cloud Using Deep Learning 2.1 Introduction 2.2 Basic Structure 2.3 Privacy in Cloud Environment Using Deep Learning 2.4 Privacy in Multi-Tenancy with Deep Learning Concept 2.5 Related Work 2.6 Conclusion References

3 Emotional Classification Using EEG Signals and Facial Expression: A Survey 3.1 Introduction 3.2 Related Works 3.3 Methods 3.4 BCI Applications 3.5 Cloud-Based EEG Overview 3.6 Conclusion References

4 Effective and Efficient Wind Power Generation Using Bifarious Solar PV System 4.1 Introduction 4.2 Study of Bi-Facial Solar Panel 4.3 Proposed System 4.4 Applications of IoT in Renewable Energy Resources 4.5 Conclusion References

10  5 Background Mosaicing Model for Wide Area Surveillance System 5.1 Introduction 5.2 Related Work 5.3 Methodology 5.4 Results and Discussion 5.5 Conclusion References

11  6 Prediction of CKD Stage 1 Using Three Different Classifiers 6.1 Introduction 6.2 Materials and Methods 6.3 Results and Discussion 6.4 Conclusions and Future Scope References

12  7 Classification of MRI Images to Aid in Diagnosis of Neurological Disorder Using SVM 7.1 Introduction 7.2 Methodology 7.3 Results and Discussions 7.4 Conclusion References

13  8 Convolutional Networks 8.1 Introduction 8.2 Convolution Operation 8.3 CNN 8.4 Practical Applications 8.5 Challenges of Profound Models 8.6 Deep Learning In Object Detection 8.7 CNN Architectures 8.8 Challenges of Item Location References

14  9 Categorization of Cloud Computing & Deep Learning 9.1 Introduction to Cloud Computing 9.2 Introduction to Deep Learning 9.3 Conclusion References

15  10 Smart Load Balancing in Cloud Using Deep Learning 10.1 Introduction 10.2 Load Balancing 10.3 Load Adjusting in Distributing Computing 10.4 Cloud Load Balancing Criteria (Measures) 10.5 Load Balancing Proposed for Cloud Computing 10.6 Load Balancing in Next Generation Cloud Computing 10.7 Dispersed AI Load Adjusting Methodology in Distributed Computing Administrations 10.8 Adaptive-Dynamic Synchronous Coordinate Strategy 10.9 Conclusion References

16  11 Biometric Identification for Advanced Cloud Security 11.1 Introduction 11.2 Literature Survey 11.3 Biometric Identification in Cloud Computing 11.4 Models and Design Goals 11.5 Face Recognition Method as a Biometric Authentication 11.6 Deep Learning Techniques for Big Data in Biometrics 11.7 Conclusion References

17  12 Application of Deep Learning in Cloud Security 12.1 Introduction 12.2 Literature Review 12.3 Deep Learning 12.4 The Uses of Fields in Deep Learning 12.5 Conclusion References

18  13 Real Time Cloud Based Intrusion Detection 13.1 Introduction 13.2 Literature Review 13.3 Incursion In Cloud 13.4 Intrusion Detection System 13.5 Types of IDS in Cloud 13.6 Model of Deep Learning 13.7 KDD Dataset 13.8 Evaluation 13.9 Conclusion References

19  14 Applications of Deep Learning in Cloud Security 14.1 Introduction 14.2 Deep Learning Methods for Cloud Cyber Security 14.3 Framework to Improve Security in Cloud Computing 14.4 WAF Deployment 14.5 Conclusion References

20  About the Editors

21  Index

22  End User License Agreement

Deep Learning Approaches to Cloud Security

Подняться наверх