Plant Disease Detection Using Image Processing and Machine Learning
Keywords:
IAAS, PAAS, SAASAbstract
Cloud computing offers various advantages to its users, such as data storage on the cloud, on-demand access to resources, pay-per-use services, and so on. As a result of these advantages, a greater number of users have been drawn to utilize the cloud's services. Because cloud customers access its services over the internet, there is a possibility of security assaults on the user's data. To identify security attacks, an attack detection system is required. The attacks are detected using a model based on machine learning techniques. The detection of attacks will benefit both cloud consumers and cloud service providers. If the model is built with machine learning methods, it can improve the performance of security systems. The security features of the systems are managed by creating security systems that use machine learning techniques.
References
- Kajaree Das Rabi Narayan Behera ” A Survey on Machine Learning Concept, Algorithm and Applications”, International Journals of Innovative Research in Computer and communication Engineering, Volume 5, Issue 2, February 2017
- Salima Omar, Asri Ngadi , Hamid H Jebur “Machine Learning Techniques for Anomaly Detection: An Overview”, International journal of computer Application, Volume 79,PP 0975-8887,October 2013.
- Vineet Richhariya, Dr J.L.Rana, Dr R.K. Pandya, Dr R.C.Jain “ An Efficient Classification Mechanism using Machines learning Techniques for Attack Detection for Large Dataset”, International Journal of Innovative Research in Science Engineering and Technology, Volume 1,Issue 2 December 2012.
- Marwane Zekri, Said El kafhali,Noureddine Aboutabit and Yoursefsaadi, “DDoS Attack Detection using Machine Learning techniques in cloud computing environments”, IEEE 3rd International conference of cloud computing technologies and applications 2017.
- Lingvei Chen, Yanfang ye, Thirimachos Bourlai, “ Adversarial Machine Learning in Malware Detection; Arms Race between Evasion Attack and defence” , European Intelligence and Security Informatics Conference 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.