Computational Intelligent Security in Wireless Communications: Wireless Communications and Networking Technologies
Editat de Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisalen Limba Engleză Hardback – 21 mar 2023
It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.
The book:
- Discusses computational algorithms for system modeling and optimization in security perspective
- Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies
- Explores a group of practical research problems where security experts can help develop new data-driven methodologies
- Covers application on artificial intelligence and wireless communication security risk perspective
The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Preț: 653.64 lei
Preț vechi: 879.35 lei
-26% Nou
Puncte Express: 980
Preț estimativ în valută:
125.10€ • 131.97$ • 104.25£
125.10€ • 131.97$ • 104.25£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032081663
ISBN-10: 103208166X
Pagini: 296
Ilustrații: 182
Dimensiuni: 156 x 234 mm
Greutate: 0.71 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Wireless Communications and Networking Technologies
ISBN-10: 103208166X
Pagini: 296
Ilustrații: 182
Dimensiuni: 156 x 234 mm
Greutate: 0.71 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Wireless Communications and Networking Technologies
Public țintă
Academic, Postgraduate, and Undergraduate AdvancedCuprins
Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT –Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Prasannavenkatesan Theerthagiri
Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande
Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le
Chapter 4: Managing IoT –Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal
Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare
Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma
Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem
Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan
Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak
Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal
Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav
Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello
Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal
Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Notă biografică
Suhel Ahmed Khan, Raees Ahmad Khan
Descriere
This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.