0% found this document useful (0 votes)
39 views6 pages

Zeba

These student got their Research, ML Models, AWS Code,Configuration and PPT done and did not paid.

Uploaded by

anglereena123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views6 pages

Zeba

These student got their Research, ML Models, AWS Code,Configuration and PPT done and did not paid.

Uploaded by

anglereena123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Research Strategy/ Objectives Metrics Dataset Environment Software Real/Simulation

Approach
Aljawarne Anomaly- Develop a Evaluation of testing Cloud-based Microsoft Real
h et al. based intrusion comprehensiv risk assessment dataset, environment sofware
(2018) detection e risk accuracy, KDD Cup
system assessment computational 99 dataset,
through framework efficiency, NSL-KDD
feature for cloud- scalability, and dataset
selection based robustness
analysis and healthcare
building systems
hybrid
efficient model
Alosaimi, RISK Enhance the Evaluation of Security Cloud-based Software Simulation
and MANAGEME effectiveness feature selection datasets environment as a
Alnuem, NT of feature accuracy, Service
(2016) FRAMEWOR selection in computational (SaaS),
KS FOR cloud security efficiency, Platform
CLOUD risk scalability, and as a
COMPUTING assessment real-world Service
applicability (PaaS),
Infrastruct
ure as a
Service
(IaaS)
Cayirci et A risk The Cloud Comparative Security Cloud-based Cloud Simulation
al. (2016) assessment Adoption analysis of datasets environment software
model for Risk predictive applicatio
selecting Assessment accuracy, n
cloud service Model is generalization
providers designed to ability,
help cloud computational
customers in complexity, and
assessing the scalability
risks that they across various
face risk assessment
by selecting a models and
specific cloud datasets
service
provider.
Duc (2019) Survey of Provide Evaluation of Google edge-cloud large- Simulation
technologies, insights into surveyed dataset, environments scale
mechanisms, state-of-the- methods in OpenClou software
and methods art resource terms of d dataset,
for reliable provisioning reliability,
resource methods and scalability,
provisioning challenges adaptability, and
real-world
applicability
Nassif Systematic Analyze the Assessment of KDD and A Systematic software Simulation
(2021) literature landscape of ML techniques' KDD CUP Review of
review of ML ML effectiveness, ’99 dataset informati
and Cloud techniques in comparison of on
security cloud performance technolog
methodologies security; metrics, and y
and techniques identify identification of as Internet
common trends services
threats and
models
Abdelaziz Novel model Enhance Evaluation of Healthcare cloud Cloud Simulation
(2018) for healthcare healthcare model datasets computing computi
services using services and performance in environment ng

Parallel VM selection terms of software

Particle efficiency in execution time


Swarm cloud reduction,
Optimization environment resource
for optimal utilization, and
VM selection diagnostic
accuracy
Zekri DDoS Detect and Assessment of DDoS Cloud Software- Simulation
(2017) detection mitigate detection attack Computing as-a-
system based DDoS attacks accuracy, datasets Environments service
on the C4.5 in cloud comparison with (SaaS),
algorithm to computing existing Platform-
mitigate DDoS environment techniques, and as a
attacks analysis of Service
scalability and (PaaS)
adaptability and
Infrastruct
ure-as-
aService
(IaaS)
Nguyen Framework for Detect Evaluation of KDDcup Mobile cloud Mobile Real
(2018) detecting cyberattacks detection 1999 environment Software
cyberattacks in in mobile accuracy, Dataset,
mobile cloud cloud comparison with NSL-KDD
computing computing; existing
Dataset,
using deep ensure data approaches, and
UNSW-
learning integrity, user analysis of
NB15
confidentialit scalability,
Dataset
y, service resource
availability requirements,
and real-world
deployment
considerations
Pavithra et Analyzes Analyze the Comparative Security Cloud-based Mobile Simulation
al. (2023) cloud security efficacy of analysis of ML datasets environment CC
using machine ML algorithm
learning algorithms in performance,
algorithms cloud security exploration of
scalability, and
examination of
real-world
applicability
Sharma Models a Develop an Evaluation of sub dataset Cloud-based Simulation
and Singh smart risk intelligent model environment SaaS
(2022) assessment risk effectiveness, (Software
approach for assessment comparison with as a
cloud framework traditional Service)
computing for cloud approaches, and
using AI and computing assessment of
supervised ML scalability and
algorithms adaptability

References

Ahmed, N. and Abraham, A. (2015a). Modeling cloud computing risk assessment using
ensemble methods,pages 261–274. Springer International Publishing.

Ahmed, N. and Abraham, A. (2015b). Modeling cloud computing risk assessment using machine
learning.

In Proceedings of the First International Afro-European Conference for Industrial Advancement


AECIA2014, pages 315–325. Springer International Publishing.

Aljawarneh, S., Aldwairi, M. and Yassein, M.B., 2018. Anomaly-based intrusion detection
system through feature selection analysis and building hybrid efficient model. Journal of
Computational Science, 25, pp.152-160.

Alosaimi, R. and Alnuem, M. (2016). Risk management frameworks for cloud computing: a
criticalreview. AIRCC’s International Journal of Computer Science and Information
Technology, pages 1–11.

Cayirci, E., Garaga, A., Santana de Oliveira, A., and Roudier, Y. (2016). A risk assessment
model forselecting cloud service providers. Journal of Cloud Computing, 5(1):14.

Dietterich, T. G. (2000). Ensemble methods in machine learning. In International workshop on


multipleclassifier systems, pages 1–15. Springer.

Drissi, S., Benhadou, S., and Medromi, H. (2016a). Evaluation of risk assessment methods
regardingcloud computing. In Proceedings of the 5th Conference on Multidisciplinary Design
Optimization andApplication.

Drissi, S., Benhadou, S., and Medromi, H. (2016b). A new shared and comprehensive tool of
cloudcomputing security risk assessment. In Proceedings of the UNet’15, volume 1, pages 155–
167. SpringerSingapore.
Iyer, E. K. (2014). Segmentation of risk factors associated with cloud computing adoption. In
Proceedingsof The International Conference on Cloud Security Management ICCSM-2014,
pages 82–89.

Latif, R., Abbas, H., Assar, S., and Ali, Q. (2014). Cloud computing risk assessment: a
systematic literature review. In FutureTech 2013, pages 285–295.

Mell, P. and Grance, T. (2011). The nist definition of cloud computing (special publication 800-
145).Technical report, National Institute of Standards and Technology.

Pavithra, B., Mishra, N., and Naveen, G. (2023). Cloud security analysis using machine learning
algorithms.

In Proceedings of the Second International Conference on Augmented Intelligence and


Sustainable

Systems ICAISS 2023, pages 704–708. IEEE.

Sharma, A. and Singh, U. K. (2022). Modelling of smart risk assessment approach for cloud
computingenvironment using ai and supervised machine learning algorithms. Global Transitions
Proceedings,3(1):243–250.

Duc, T. L., Leiva, R. G., Casari, P., &Östberg, P. O. (2019). Machine learning methods for
reliable resource provisioning in edge-cloud computing: A survey. ACM Computing Surveys
(CSUR), 52(5), 1-39.”?”

Nassif, A. B., Talib, M. A., Nasir, Q., Albadani, H., &Dakalbab, F. M. (2021). Machine learning
for cloud security: a systematic review. IEEE Access, 9, 20717-20735.

Abdelaziz, A., Elhoseny, M., Salama, A. S., &Riad, A. M. (2018). A machine learning model for
improving healthcare services on cloud computing environment. Measurement, 119, 117-128.

Zekri, M., El Kafhali, S., Aboutabit, N., &Saadi, Y. (2017, October). DDoS attack detection
using machine learning techniques in cloud computing environments. In 2017 3rd international
conference of cloud computing technologies and applications (CloudTech) (pp. 1-7). IEEE.
Nguyen, K. K., Hoang, D. T., Niyato, D., Wang, P., Nguyen, D., &Dutkiewicz, E. (2018, April).
Cyberattack detection in mobile cloud computing: A deep learning approach. In 2018 IEEE
wireless communications and networking conference (WCNC) (pp. 1-6). IEEE.

You might also like