Computational Intelligent Security in Wireless Communications (Wireless Communications and Networking Technologies)

個数:
電子版価格
¥11,096
  • 電子版あり

Computational Intelligent Security in Wireless Communications (Wireless Communications and Networking Technologies)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 296 p.
  • 言語 ENG
  • 商品コード 9781032081663
  • DDC分類 621.384

Full Description

Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.

It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.

The book:

Discusses computational algorithms for system modeling and optimization in security perspective
Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies
Explores a group of practical research problems where security experts can help develop new data-driven methodologies
Covers application on artificial intelligence and wireless communication security risk perspective

The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

Contents

Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri

Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande

Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le

Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal

Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare

Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma

Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem

Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan

Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak

Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal

Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav

Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello

Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal

Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla

最近チェックした商品