7 Chapter 8Table 8.1 Comparative study.
8 Chapter 9Table 9.1 Mean of mean accuracies of different classifiers in k-fold cross-valid...Table 9.2 Mean of mean F1 scores of different classifiers in k-fold cross-valida...Table 9.3 Performance comparison with contemporary works.
9 Chapter 10Table 10.1 Model comparison.Table 10.2 Dataset attributes and its description of phishing URLs.Table 10.3 Dataset attributes and its description of URLs.Table 10.4 Comparison of the parameter values for different models.Table 10.5 Comparison of the various models for its metrics.Table 10.6 Summary.Table 10.7 ANOVA.Table 10.8 Summary.Table 10.9 ANOVA.Table 10.10 Descriptive statistics.
10 Chapter 11Table 11.1 List of recent studies on the improvement of honeypots in the cloud.Table 11.2 List of recent studies application of blockchain for security in the ...Table 11.3 Honeypots for cloud security analysis.Table 11.4 Blockchain for cloud security analysis.
11 Chapter 12Table 12.1 Threats faced in cloud computing.Table 12.2 Attacks faced in cloud computing.Table 12.3 Supervised learning techniques with the highest accuracy.Table 12.4 Unsupervised learning techniques with the highest accuracy.Table 12.5 Hybrid Learning Techniques with the highest accuracy.Table 12.6 Supervised learning analysis.Table 12.7 Unsupervised learning analysis.Table 12.8 Hybrid learning analysis.
12 Chapter 13Table 13.1 Types and examples of five bugs generated methods [26].Table 13.2 Instances of original and adversarial sentences [27].Table 13.3 Different transformer functions with results [29].Table 13.4 Nearest neighbor words based on cosine similarity when hotflip is app...Table 13.5 Comparison of various attacks using TextAttack framework.Table 13.6 Sample output from various text attacks during execution.
13 Chapter 14Table 14.1 Performance comparison ( N is exported data item).Table 14.2 Benchmark of co-residence (two files) [26].
14 Chapter 15Table 15.1 Responsibility division across SaaS, PaaS, and IaaS (source: BigComme...Table 15.2 Basic permission levels.Table 15.3 The core of Google Cloud Platform.Table 15.4 Common terminology between Amazon Web Services, Microsoft Azure, and ...
15 Chapter 16Table 16.1 Types of encryption keys.
16 Chapter 17Table 17.1 Nutanix Hybrid Cloud Services.
17 Chapter 18Table 18.1 Description of the neighborhood notation used in this work.Table 18.2 Main information obtained from the user-user graph partitioning. The ...Table 18.3 Main results obtained for three sets of random ACPs generated for the...Table 18.4 Relevant results of the accuracy metric calculation in the graph G , w...
18 Chapter 19Table 19.1 List of iSchools registered internationally under the iSchools Organi...Table 19.2 List of iSchools of American regions offering AI, ML, and Robotics pr...Table 19.3 List of iSchools of American regions offering AI, ML, and Robotics pr...Table 19.4 Sample curricula of the PhD with ML, Robotics, etc.Table 19.5 Sample courses of AI, ML, and Robotics programs at Master and Bachelo...
1 Cover
2 Table of Contents
3 Title Page
4 Copyright
5 Preface
6 Begin Reading
7 Index
8 End User License Agreement
1 v
2 ii
3 iii
4 iv
5 xix
6 xx
7 xxi
8 xxii
9 xxiii
10 1
11 3
12 4
13 5
14 6
15 7
16 8
17 9
18 10
19 11
20 12
21 13
22 14
23 15
24 16
25 17
26 18
27 19
28 20
29 21
30 22
31 23
32 25
33 26
34 27
35 28
36 29
37 30
38 31
39 32
40 33
41 34
42 35
43 36
44 37
45 38
46 39
47 40
48 41
49 42
50 43
51 44
52 45
53 46
54 47
55 48
56 49
57 50
58 51
59 52
60 53
61 54
62 55
63 56
64 57
65 58
66 59
67 60
68 61
69 63
70 64
71 65
72 66
73 67
74 68
75 69
76 70
77 71
78 72
79 73
80 74
81 75
82 76
83 77
84 78
85 79
86 81
87 82
88 83
89 84
90 85
91 86
92 87
93 88
94 89
95 90
96 91
97 92
98 93
99 94
100 95
101 96
102 97
103 98
104 99
105 100
106 101
107 103
108 104
109 105
110 106
111 107
112 108
113 109
114 110
115 111
116 112
117 113
118 114
119 115
120 116
121 117
122 118
123 119
124 120
125 121
126 122
127 123
128 124
129 125
130 126
131 127
132 128
133 129
134 130
135 131
136 132
137 133
138 134
139 135
140 136
141 137
142 138
143 139
144 140
145 141
146 142
147 143
148 144
149 145
150 146
151 147
152 149
153 150
154 151
155 152
156 153
157 154
158 155
159 156
160 157
161 158
162 159
163 160
164 161
165 162
166 163
167 164
168 165
169 166
170 167
171 168
172 169
173 170
174 171
175 172
176 173
177 174
178 175
179 176
180 177
181 178
182 179
183 180
184 181
185 182
186 183
187 184
188 185
189 186
190 187
191 188
192 189
193 190
194 191
195 193
196 194
197 195
198 196
199 197
200 198
201 199
202 200
203 201
204 202
205 203
206 204
207 205
208 206
209 207
210 208
211 209
212 210
213 211
214 212
215 213
216 215
217 216
218 217
219 218
220 219
221 220
222 221
223 222
224 223
225 224
226 225
227 226
228 227
229 228
230 229
231 230
232 231
233 232
234 233
235 234
236 235
237 236
238 237
239 239
240 240
241 241
242 242
243 243
244 244
245 245
246 246
247 247
248 248
249 249
250 250
251 251
252 252
253 253
254 254
255 255
256 256
257 257
258 258
259 259
260 260
261 261
262 262
263 263
264 264
265 265
266 266
267 267
268 268
269 269
270 271
271 272
272 273
273 274
274 275
275 276
276 277
277 278
278 279
279 280
280 281
281 282
282 283
283 284
284 285
285 286
286 287
287 288
288 289
289 290
290 291
291 293
292 294
293 295
294 296
295 297
296 298
297 299
298 300
299 301
300 302
301 303
302 304
303 305
304 306
305 307
306 308
307 309
308 310
309 311
310 312
311 313
312 315
313 316
314 317
315 318
316 319
317 320
318 321
319 322
320 323
321 324
322 325
323 326
324 327
325 328
326 329
327 330
328 331
329 332
330 333
331 334
332 335
333 336
334 337
335 338
336 339
337 340
338 341
339 342
340 343
341 344
342 345
343 346
344 347
345 348
Читать дальше