Knowledge revolution is transforming the globe from traditional society to a technology-driven society. Online transactions have compounded, exposing the world to a new demon called cybercrime. Human beings are being replaced by devices and robots, leading to artificial intelligence. Robotics, image processing, machine vision, and machine learning are changing the lifestyle of citizens. Machine learning contains algorithms which are capable of learning from historical occurrences. This chapter discusses the concept of machine learning, cyber security, cybercrime, and applications of machine learning in cyber security domain. Malware detection and network intrusion are a few areas where machine learning and deep learning can be applied. The authors have also elaborated on the research advancements and challenges in machine learning related to cyber security. The last section of this chapter lists the future trends and directions in machine learning and cyber security.
Resource allocation and scheduling algorithms are the two essential factors that determine the satisfaction of cloud users. The major cloud resources involved here are servers, storage, network, databases, software and so on based on requirements of customers. In the competitive scenario, each service provider tries to use factors like optimal configuration of resources, pricing, Quality of Service (QoS) parameters and Service Level Agreement (SLA) in order to benefit cloud users and service providers. Since, many researchers have proposed different scheduling algorithms and resource allocation strategies, it becomes a cumbersome task to conclude which ones really benefit customers and service providers. Hence, this paper analyses and presents the most relevant considerations that would help the cloud researchers in achieving their goals in terms of mapping of tasks to cloud resources.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.