![]() Her big break in Hindi Television was Badii Devrani. His field of interest is mainly in coding theory, data and network security, remote sensing & GIS-based applications, data compression error corrections, information security, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing/security, unify computing, chaos theory, and applications.She started her career with the Bengali serial Joto Hashi Tato Ranna. Jyotsna Kumar Mandal obtained his PhD in CSE from Jadavpur University He has more than 450 publications in reputed international journals and conferences. ![]() His field of interest is mainly in AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, data mining. He has published more than 80 papers in reputed international journals and conferences. He is currently a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata. His field of interest is mainly in cryptography and computer security.Īnupam Ghosh obtained his PhD in Engineering from Jadavpur University. He has several publications in reputed international journals and conferences and has authored a book on hardware cryptography. ![]() He is currently an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Garia, Kolkata, India. Rajdeep Chakraborty obtained his PhD in CSE from the University of Kalyani. Research scholars and industry engineers in computer sciences, electrical and electronics engineering, machine learning, computer security, information technology, and cryptography. ![]() The book also contains case studies/projects outlining how to implement various security features using machine learning algorithms and analytics on existing cloud-based products in public, private and hybrid cloud respectively. Machine learning algorithms can also be used to meet various cloud security issues, such as effective intrusion detection systems, zero-knowledge authentication systems, measures for passive attacks, protocols design, privacy system designs, applications, and many more. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment. The conventional cryptography approach is less applied in resource-constrained devices. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. ![]() This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |