Search

Browse Subject Areas

For Authors

Submit a Proposal

Machine Learning Techniques and Analytics for Cloud Security.

Edited by Rajdeep Chakraborty, Anupam Ghosh and Jyotsna Kumar Mandal
Series: Advances in Learning Analytics for Intelligent Cloud-IoT Systems
Copyright: 2022   |   Status: Published
ISBN: 9781119762256  |  Hardcover  |  
480 pages | 122 illustrations
Price: $225 USD
Add To Cart

One Line Description
This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions.

Audience
Research scholars and industry engineers in computer sciences, electrical and electronics engineering, machine learning, computer security, information technology, and cryptography.


Description
The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment. Machine learning algorithms can also be used to meet various cloud security issues, such as effective intrusion detection systems, zero-knowledge authentication systems, measures for passive attacks, protocols design, privacy system designs, applications, and many more. The book also contains case studies/projects outlining how to implement various security features using machine learning algorithms and analytics on existing cloud-based products in public, private and hybrid cloud respectively.

Back to Top
Author / Editor Details
Rajdeep Chakraborty, PhD obtained his PhD in CSE from the University of Kalyani. He is currently an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Garia, Kolkata, India. He has several publications in reputed international journals and conferences and has authored a book on hardware cryptography. His field of interest is mainly in cryptography and computer security.

Anupam Ghosh, PhD obtained his PhD in Engineering from Jadavpur University. He is currently a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata. He has published more than 80 papers in reputed international journals and conferences. His field of interest is mainly in AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, data mining.

Jyotsna Kumar Mandal, PhD obtained his PhD in CSE from Jadavpur University He has more than 450 publications in reputed international journals and conferences. His field of interest is mainly in coding theory, data and network security, remote sensing & GIS-based applications, data compression error corrections, information security, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing/security, unify computing, chaos theory, and applications.

Back to Top

Table of Contents
Preface
Part I: Conceptual Aspects on Cloud and Applications of Machine Learning
1. Hybrid Cloud: A New Paradigm in Cloud Computing

Moumita Deb and Abantika Choudhury
1.1 Introduction
1.2 Hybrid Cloud
1.2.1 Architecture
1.2.2 Why Hybrid Cloud is Required?
1.2.3 Business and Hybrid Cloud
1.2.4 Things to Remember When Deploying Hybrid Cloud
1.3 Comparison Among Different Hybrid Cloud Providers
1.3.1 Cloud Storage and Backup Benefits
1.3.2 Pros and Cons of Different Service Providers
1.3.2.1 AWS Outpost
1.3.2.2 Microsoft Azure Stack
1.3.2.3 Google Cloud Anthos
1.3.3 Review on Storage of the Providers
1.3.3.1 AWS Outpost Storage
1.3.3.2 Google Cloud Anthos Storage
1.3.4 Pricing
1.4 Hybrid Cloud in Education
1.5 Significance of Hybrid Cloud Post-Pandemic
1.6 Security in Hybrid Cloud
1.6.1 Role of Human Error in Cloud Security
1.6.2 Handling Security Challenges
1.7 Use of AI in Hybrid Cloud
1.8 Future Research Direction
1.9 Conclusion
References
2. Recognition of Differentially Expressed Glycan Structure of H1N1 Virus Using Unsupervised Learning Framework
Shillpi Mishrra
2.1 Introduction
2.2 Proposed Methodology
2.3 Result
2.3.1 Description of Datasets
2.3.2 Analysis of Result
2.3.3 Validation of Results
2.3.3.1 T-Test (Statistical Validation)
2.3.3.2 Statistical Validation
2.3.4 Glycan Cloud
2.4 Conclusions and Future Work
References
3. Selection of Certain Cancer Mediating Genes Using a Hybrid
Model Logistic Regression Supported by Principal Component Analysis (PC-LR)

Subir Hazra, Alia Nikhat Khurshid and Akriti
3.1 Introduction
3.2 Related Methods
3.3 Methodology
3.3.1 Description
3.3.2 Flowchart
3.3.3 Algorithm
3.3.4 Interpretation of the Algorithm
3.3.5 Illustration
3.4 Result
3.4.1 Description of the Dataset
3.4.2 Result Analysis
3.4.3 Result Set Validation
3.5 Application in Cloud Domain
3.6 Conclusion
References
Part II: Cloud Security Systems Using Machine Learning Techniques
4. Cost-Effective Voice-Controlled Real-Time Smart Informative Interface Design With Google Assistance Technology

Soumen Santra, Partha Mukherjee and Arpan Deyasi
4.1 Introduction
4.2 Home Automation System
4.2.1 Sensors
4.2.2 Protocols
4.2.3 Technologies
4.2.4 Advantages
4.2.5 Disadvantages
4.3 Literature Review
4.4 Role of Sensors and Microcontrollers in Smart Home Design
4.5 Motivation of the Project
4.6 Smart Informative and Command Accepting Interface
4.7 Data Flow Diagram
4.8 Components of Informative Interface
4.9 Results
4.9.1 Circuit Design
4.9.2 LDR Data
4.9.3 API Data
4.10 Conclusion
4.11 Future Scope
References
5. Symmetric Key and Artificial Neural Network With Mealy Machine: A Neoteric Model of Cryptosystem for Cloud Security
Anirban Bhowmik, Sunil Karforma and Joydeep Dey
5.1 Introduction
5.2 Literature Review
5.3 The Problem
5.4 Objectives and Contributions
5.5 Methodology
5.6 Results and Discussions
5.6.1 Statistical Analysis
5.6.2 Randomness Test of Key
5.6.3 Key Sensitivity Analysis
5.6.4 Security Analysis
5.6.5 Dataset Used on ANN
5.6.6 Comparisons
5.7 Conclusions
References
6. An Efficient Intrusion Detection System on Various Datasets Using Machine Learning Techniques
Debraj Chatterjee
6.1 Introduction
6.2 Motivation and Justification of the Proposed Work
6.3 Terminology Related to IDS
6.3.1 Network
6.3.2 Network Traffic
6.3.3 Intrusion
6.3.4 Intrusion Detection System
6.3.4.1 Various Types of IDS
6.3.4.2 Working Methodology of IDS
6.3.4.3 Characteristics of IDS
6.3.4.4 Advantages of IDS
6.3.4.5 Disadvantages of IDS
6.3.5 Intrusion Prevention System (IPS)
6.3.5.1 Network-Based Intrusion Prevention System (NIPS)
6.3.5.2 Wireless Intrusion Prevention System (WIPS)
6.3.5.3 Network Behavior Analysis (NBA)
6.3.5.4 Host-Based Intrusion Prevention System (HIPS)
6.3.6 Comparison of IPS With IDS/Relation Between IDS and IPS
6.3.7 Different Methods of Evasion in Networks
6.4 Intrusion Attacks on Cloud Environment
6.5 Comparative Studies
6.6 Proposed Methodology
6.7 Result
6.8 Conclusion and Future Scope
References
7. You Are Known by Your Mood: A Text-Based Sentiment Analysis for Cloud Security
Abhijit Roy and Parthajit Roy
7.1 Introduction
7.2 Literature Review
7.3 Essential Prerequisites
7.3.1 Security Aspects
7.3.2 Machine Learning Tools
7.3.2.1 Naïve Bayes Classifier
7.3.2.2 Artificial Neural Network
7.4 Proposed Model
7.5 Experimental Setup
7.6 Results and Discussions
7.7 Application in Cloud Security
7.7.1 Ask an Intelligent Security Question
7.7.2 Homomorphic Data Storage
7.7.3 Information Diffusion
7.8 Conclusion and Future Scope
References
8. The State-of-the-Art in Zero-Knowledge Authentication Proof for Cloud Priyanka Ghosh
8.1 Introduction
8.2 Attacks and Countermeasures
8.2.1 Malware and Ransomware Breaches
8.2.2 Prevention of Distributing Denial of Service
8.2.3 Threat Detection
8.3 Zero-Knowledge Proof
8.4 Machine Learning for Cloud Computing
8.4.1 Types of Learning Algorithms
8.4.1.1 Supervised Learning
8.4.1.2 Supervised Learning Approach
8.4.1.3 Unsupervised Learning
8.4.2 Application on Machine Learning for Cloud Computing
8.4.2.1 Image Recognition
8.4.2.2 Speech Recognition
8.4.2.3 Medical Diagnosis
8.4.2.4 Learning Associations
8.4.2.5 Classification
8.4.2.6 Prediction
8.4.2.7 Extraction
8.4.2.8 Regression
8.4.2.9 Financial Services
8.5 Zero-Knowledge Proof: Details
8.5.1 Comparative Study
8.5.1.1 Fiat-Shamir ZKP Protocol
8.5.2 Diffie-Hellman Key Exchange Algorithm
8.5.2.1 Discrete Logarithm Attack
8.5.2.2 Man-in-the-Middle Attack
8.5.3 ZKP Version 1
8.5.4 ZKP Version 2
8.5.5 Analysis
8.5.6 Cloud Security Architecture
8.5.7 Existing Cloud Computing Architectures
8.5.8 Issues With Current Clouds
8.6 Conclusion
References
9. A Robust Approach for Effective Spam Detection Using Supervised
Learning Techniques

Amartya Chakraborty, Suvendu Chattaraj, Sangita Karmakar and Shillpi Mishrra
9.1 Introduction
9.2 Literature Review
9.3 Motivation
9.4 System Overview
9.5 Data Description
9.6 Data Processing
9.7 Feature Extraction
9.8 Learning Techniques Used
9.8.1 Support Vector Machine
9.8.2 k-Nearest Neighbors
9.8.3 Decision Tree
9.8.4 Convolutional Neural Network
9.9 Experimental Setup
9.10 Evaluation Metrics
9.11 Experimental Results
9.11.1 Observations in Comparison With State-of-the-Art
9.12 Application in Cloud Architecture
9.13 Conclusion
References
10. An Intelligent System for Securing Network From Intrusion Detection
and Prevention of Phishing Attack Using Machine Learning Approaches
Sumit Banik, Sagar Banik and Anupam Mukherjee
10.1 Introduction
10.1.1 Types of Phishing
10.1.1.1 Spear Phishing
10.1.1.2 Whaling
10.1.1.3 Catphishing and Catfishing
10.1.1.4 Clone Phishing
10.1.1.5 Voice Phishing
10.1.2 Techniques of Phishing
10.1.2.1 Link Manipulation
10.1.2.2 Filter Evasion
10.1.2.3 Website Forgery
10.1.2.4 Covert Redirect
10.2 Literature Review
10.3 Materials and Methods
10.3.1 Dataset and Attributes
10.3.2 Proposed Methodology
10.3.2.1 Logistic Regression
10.3.2.2 Naïve Bayes
10.3.2.3 Support Vector Machine
10.3.2.4 Voting Classification
10.4 Result Analysis
10.4.1 Analysis of Different Parameters for ML Models
10.4.2 Predictive Outcome Analysis in Phishing URLs Dataset
10.4.3 Analysis of Performance Metrics
10.4.4 Statistical Analysis of Results
10.4.4.1 ANOVA: Two-Factor Without Replication
10.4.4.2 ANOVA: Single Factor
10.5 Conclusion
References
Part III: Cloud Security Analysis Using Machine Learning Techniques
11 Cloud Security Using Honeypot Network and Blockchain: A Review

Smarta Sangui* and Swarup Kr Ghosh
11.1 Introduction
11.2 Cloud Computing Overview
11.2.1 Types of Cloud Computing Services
11.2.1.1 Software as a Service
11.2.1.2 Infrastructure as a Service
11.2.1.3 Platform as a Service
11.2.2 Deployment Models of Cloud Computing
11.2.2.1 Public Cloud
11.2.2.2 Private Cloud
11.2.2.3 Community Cloud
11.2.2.4 Hybrid Cloud
11.2.3 Security Concerns in Cloud Computing
11.2.3.1 Data Breaches
11.2.3.2 Insufficient Change Control and Misconfiguration
11.2.3.3 Lack of Strategy and Security Architecture
11.2.3.4 Insufficient Identity, Credential, Access, and Key Management
11.2.3.5 Account Hijacking
11.2.3.6 Insider Threat
11.2.3.7 Insecure Interfaces and APIs
11.2.3.8 Weak Control Plane
11.3 Honeypot System
11.3.1 VM (Virtual Machine) as Honeypot in the Cloud
11.3.2 Attack Sensing and Analyzing Framework
11.3.3 A Fuzzy Technique Against Fingerprinting Attacks
11.3.4 Detecting and Classifying Malicious Access
11.3.5 A Bayesian Defense Model for Deceptive Attack
11.3.6 Strategic Game Model for DDoS Attacks in Smart Grid
11.4 Blockchain
11.4.1 Blockchain-Based Encrypted Cloud Storage
11.4.2 Cloud-Assisted EHR Sharing via Consortium Blockchain
11.4.3 Blockchain-Secured Cloud Storage
11.4.4 Blockchain and Edge Computing–Based Security Architecture
11.4.5 Data Provenance Architecture in Cloud Ecosystem Using Blockchain
11.6 Comparative Analysis
11.7 Conclusion
References
12. Machine Learning–Based Security in Cloud Database—A Survey
Utsav Vora, Jayleena Mahato, Hrishav Dasgupta, Anand Kumar and Swarup Kr Ghosh
12.1 Introduction
12.2 Security Threats and Attacks
12.3 Dataset Description
12.3.1 NSL-KDD Dataset
12.3.2 UNSW-NB15 Dataset
12.4 Machine Learning for Cloud Security
12.4.1 Supervised Learning Techniques
12.4.1.1 Support Vector Machine
12.4.1.2 Artificial Neural Network
12.4.1.3 Deep Learning
12.4.1.4 Random Forest
12.4.2 Unsupervised Learning Techniques
12.4.2.1 K-Means Clustering
12.4.2.2 Fuzzy C-Means Clustering
12.4.2.3 Expectation-Maximization Clustering
12.4.2.4 Cuckoo Search With Particle Swarm Optimization (PSO)
12.4.3 Hybrid Learning Techniques
12.4.3.1 HIDCC: Hybrid Intrusion Detection Approach in Cloud Computing
12.4.3.2 Clustering-Based Hybrid Model in Deep Learning Framework
12.4.3.3 K-Nearest Neighbor-Based Fuzzy C-Means Mechanism
12.4.3.4 K-Mans Clustering Using Support Vector Machine
12.4.3.5 K-Nearest Neighbor-Based Artificial Neural Network Mechanism
12.4.3.6 Artificial Neural Network Fused With Support Vector Machine
12.4.3.7 Particle Swarm Optimization-Based Probabilistic Neural Network
12.5 Comparative Analysis
12.6 Conclusion
References
13. Machine Learning Adversarial Attacks: A Survey Beyond
Chandni Magoo and Puneet Garg
13.1 Introduction
13.2 Adversarial Learning
13.2.1 Concept
13.3 Taxonomy of Adversarial Attacks
13.3.1 Attacks Based on Knowledge
13.3.1.1 Black Box Attack (Transferable Attack)
13.3.1.2 White Box Attack
13.3.2 Attacks Based on Goals
13.3.2.1 Target Attacks
13.3.2.2 Non-Target Attacks
13.3.3 Attacks Based on Strategies
13.3.3.1 Poisoning Attacks
13.3.3.2 Evasion Attacks
13.3.4 Textual-Based Attacks (NLP)
13.3.4.1 Character Level Attacks
13.3.4.2 Word-Level Attacks
13.3.4.3 Sentence-Level Attacks
13.4 Review of Adversarial Attack Methods
13.4.1 L-BFGS
13.4.2 Feedforward Derivation Attack (Jacobian Attack)
13.4.3 Fast Gradient Sign Method
13.4.4 Methods of Different Text-Based Adversarial Attacks
13.4.5 Adversarial Attacks Methods Based on Language Models
13.4.6 Adversarial Attacks on Recommender Systems
13.4.6.1 Random Attack
13.4.6.2 Average Attack
13.4.6.3 Bandwagon Attack
13.4.6.4 Reverse Bandwagon Attack
13.5 Adversarial Attacks on Cloud-Based Platforms
13.6 Conclusion
References
14. Protocols for Cloud Security
Weijing You and Bo Chen
14.1 Introduction
14.2 System and Adversarial Model
14.2.1 System Model
14.2.2 Adversarial Model
14.3 Protocols for Data Protection in Secure Cloud Computing
14.3.1 Homomorphic Encryption
14.3.2 Searchable Encryption
14.3.3 Attribute-Based Encryption
14.3.4 Secure Multi-Party Computation
14.4 Protocols for Data Protection in Secure Cloud Storage
14.4.1 Proofs of Encryption
14.4.2 Secure Message-Locked Encryption
14.4.3 Proofs of Storage
14.4.4 Proofs of Ownership
14.4.5 Proofs of Reliability
14.5 Protocols for Secure Cloud Systems
14.6 Protocols for Cloud Security in the Future
14.7 Conclusion
References
Part IV: Case Studies Focused on Cloud Security
15 A Study on Google Cloud Platform (GCP) and Its Security

Agniswar Roy, Abhik Banerjee and Navneet Bhardwaj
15.1 Introduction
15.1.1 Google Cloud Platform Current Market Holding
15.1.1.1 The Forrester Wave
15.1.1.2 Gartner Magic Quadrant
15.1.2 Google Cloud Platform Work Distribution
15.1.2.1 SaaS
15.1.2.2 PaaS
15.1.2.3 IaaS
15.1.2.4 On-Premise
15.2 Google Cloud Platform’s Security Features Basic Overview
15.2.1 Physical Premises Security
15.2.2 Hardware Security
15.2.3 Inter-Service Security
15.2.4 Data Security
15.2.5 Internet Security
15.2.6 In-Software Security
15.2.7 End User Access Security
15.3 Google Cloud Platform’s Architecture
15.3.1 Geographic Zone
15.3.2 Resource Management
15.3.2.1 IAM
15.3.2.2 Roles
15.3.2.3 Billing
15.4 Key Security Features
15.4.1 IAP
15.4.2 Compliance
15.4.3 Policy Analyzer
15.4.4 Security Command Center
15.4.4.1 Standard Tier
15.4.4.2 Premium Tier
15.4.5 Data Loss Protection
15.4.6 Key Management
15.4.7 Secret Manager
15.4.8 Monitoring
15.5 Key Application Features
15.5.1 Stackdriver (Currently Operations)
15.5.1.1 Profiler
15.5.1.2 Cloud Debugger
15.5.1.3 Trace
15.5.2 Network
15.5.3 Virtual Machine Specifications
15.5.4 Preemptible VMs
15.6 Computation in Google Cloud Platform
15.6.1 Compute Engine
15.6.2 App Engine
15.6.3 Container Engine
15.6.4 Cloud Functions
15.7 Storage in Google Cloud Platform
15.8 Network in Google Cloud Platform
15.9 Data in Google Cloud Platform
15.10 Machine Learning in Google Cloud Platform
15.11 Conclusion
References
16. Case Study of Azure and Azure Security Practices
Navneet Bhardwaj, Abhik Banerjee and Agniswar Roy
16.1 Introduction
16.1.1 Azure Current Market Holding
16.1.2 The Forrester Wave
16.1.3 Gartner Magic Quadrant
16.2 Microsoft Azure—The Security Infrastructure
16.2.1 Azure Security Features and Tools
16.2.2 Network Security
16.3 Data Encryption
16.3.1 Data Encryption at Rest
16.3.2 Data Encryption at Transit
16.3.3 Asset Inventory Management
16.3.4 Azure Marketplace
16.4 Azure Cloud Security Architcture
16.4.1 Working
16.4.2 Design Principles
16.4.2.1 Alignment of Security Policies
16.4.2.2 Building a Comprehensive Strategy
16.4.2.3 Simplicity Driven
16.4.2.4 Leveraging Native Controls
16.4.2.5 Identification-Based Authentication
16.4.2.6 Accountability
16.4.2.7 Embracing Automation
16.4.2.8 Stress Information Protection
16.4.2.9 Continuous Evaluation
16.4.2.10 Skilled Workforce
16.5 Azure Architecture
16.5.1 Components
16.5.1.1 Azure Api Gateway
16.5.1.2 Azure Functions
16.5.2 Services
16.5.2.1 Azure Virtual Machine
16.5.2.2 Blob Storage
16.5.2.3 Azure Virtual Network
16.5.2.4 Content Delivery Network
16.5.2.5 Azure SQL Database
16.6 Features of Azure
16.6.1 Key Features
16.6.1.1 Data Resiliency
16.6.1.2 Data Security
16.6.1.3 BCDR Integration
16.6.1.4 Storage Management
16.6.1.5 Single Plane View
16.7 Common Azure Security Features
16.7.1 Security Center
16.7.2 Key Vault
16.7.3 Azure Active Directory
16.7.3.1 Application Management
16.7.3.2 Conditional Access
16.7.3.3 Device Identity Management
16.7.3.4 identity Protection
16.7.3.5 Azure Sentinel
16.7.3.6 Privileged Identity Management
16.7.3.7 Multifactor Authentication
16.7.3.8 Single Sign On
16.8 Conclusion
References
17 Nutanix Hybrid Cloud From Security Perspective
Abhik Banerjee, Agniswar Roy, Amar Kalvikatte and Navneet Bhardwaj
17.1 Introduction
17.2 Growth of Nutanix
17.2.1 Gartner Magic Quadrant
17.2.2 The Forrester Wave
17.2.3 Consumer Acquisition
17.2.4 Revenue
17.3 Introductory Concepts
17.3.1 Plane Concepts
17.3.1.1 Control Plane
17.3.1.2 Data Plane
17.3.2 Security Technical Implementation Guides
17.3.3 SaltStack and SCMA
17.4 Nutanix Hybrid Cloud
17.4.1 Prism
17.4.1.1 Prism Element
17.4.1.2 Prism Central
17.4.2 Acropolis
17.4.2.1 Distributed Storage Fabric
17.4.2.2 AHV
17.5 Reinforcing AHV and Controller VM
17.6 Disaster Management and Recovery
17.6.1 Protection Domains and Consistent Groups
17.6.2 Nutanix DSF Replication of OpLog
17.6.3 DSF Snapshots and VmQueisced Snapshot Service
17.6.4 Nutanix Cerebro
17.7 Security and Policy Management on Nutanix Hybrid Cloud
17.7.1 Authentication on Nutanix
17.7.2 Nutanix Data Encryption
17.7.3 Security Policy Management
17.7.3.1 Enforcing a Policy
17.7.3.2 Priority of a Policy
17.7.3.3 Automated Enforcement
17.8 Network Security and Log Management
17.8.1 Segmented and Unsegmented Network
17.9 Conclusion
References
Part V: Policy Aspects
18. A Data Science Approach Based on User Interactions to Generate Access Control Policies for Large Collections of Documents

Jedidiah Yanez-Sierra, Arturo Diaz-Perez and Victor Sosa-Sosa
18.1 Introduction
18.2 Related Work
18.3 Network Science Theory
18.4 Approach to Spread Policies Using Networks Science
18.4.1 Finding the Most Relevant Spreaders
18.4.1.1 Weighting Users
18.4.1.2 Selecting the Top  Spreaders
18.4.2 Assign and Spread the Access Control Policies
18.4.2.1 Access Control Policies
18.4.2.2 Horizontal Spreading
18.4.2.3 Vertical Spreading (Bottom-Up)
18.4.2.4 Policies Refinement
18.4.3 Structural Complexity Analysis of CP-ABE Policies
18.4.3.1 Assessing the WSC for ABE Policies
18.4.3.2 Assessing the Policies Generated in the Spreading Process
18.4.4 Effectiveness Analysis
18.4.4.1 Evaluation Metrics
18.4.4.2 Adjusting the Interaction Graph too Assess Policy Effectiveness
18.4.4.3 Method to Complement the User Interactions (Synthetic Edges Generation)
18.4.5 Measuring Policy Effectiveness in the User Interaction Graph 403
18.4.5.1 Simple Node-Based Strategy
18.4.5.2 Weighted Node-Based Strategy
18.5 Evaluation
18.5.1 Dataset Description
18.5.2 Results of the Complexity Evaluation
18.5.3 Effectiveness Results From the Real Edges
18.5.4 Effectiveness Results Using Real and Synthetic Edges
18.5.4.1 Results of the Effectiveness Metrics for the Enhanced G*Graph
18.6 Conclusions
References
19. AI, ML, & Robotics in iSchools: An Academic Analysis for an Intelligent
Societal Systems

P. K. Paul
19.1 Introduction
19.2 Objective
19.3 Methodology
19.3.1 iSchools, Technologies, and Artificial Intelligence, ML, and Robotics
19.4 Artificial Intelligence, ML, and Robotics: An Overview
19.5 Artificial Intelligence, ML, and Robotics as an Academic Program:
A Case on iSchools—North American Region
19.6 Suggestions
19.7 Motivation and Future Works
19.8 Conclusion

Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page