Deep learning strategies for security enhancement in wireless sensor networks:
"This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques"--
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, PA
IGI Global
[2020]
|
Subjects: | |
Links: | https://doi.org/10.4018/978-1-7998-5068-7 https://doi.org/10.4018/978-1-7998-5068-7 https://doi.org/10.4018/978-1-7998-5068-7 https://doi.org/10.4018/978-1-7998-5068-7 https://doi.org/10.4018/978-1-7998-5068-7 |
Summary: | "This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques"-- |
Physical Description: | 1 Online-Ressource |
ISBN: | 9781799850694 |
DOI: | 10.4018/978-1-7998-5068-7 |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046822614 | ||
003 | DE-604 | ||
005 | 20211110 | ||
007 | cr|uuu---uuuuu | ||
008 | 200724s2020 xx o|||| 00||| eng d | ||
020 | |a 9781799850694 |9 978-1-7998-5069-4 | ||
035 | |a (OCoLC)1190919907 | ||
035 | |a (DE-599)BVBBV046822614 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Deep learning strategies for security enhancement in wireless sensor networks |c K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Deep learning strategies for security enhancement in wireless sensor networks / K. Martin Sagayam, Karunya Institute of Technology and Sciences, India, Bharat Bhushan, Birla Institute of Technology, Mesra, Ranchi, India, Diana Andrushia, Karunya Institute of Technology and Sciences, India, Victor Hugo C. de Albuquerque, Universidade de Fortaleza · Department of Computer Science, Brazil -- The threat of intelligent attackers using deep learning : The backoff attack case / Juan Parras, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain, Santiago Zazo, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain -- A Speed Control Based Big Data Collection Algorithm (SCBDCA) using clusters and portable sink WSNs / Rajkumar K, PSNA College of Engineering and Technology, India, Jeyalakshmi V, College of Engineering Guindy, Chennai, India, Ebenezer V, Karunya Institute of Technology and Sciences, India, Ramesh G, KLN College of Engineering, India | |
520 | |a "This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques"-- | ||
650 | 4 | |a Wireless sensor networks / Security measures | |
650 | 4 | |a Machine learning | |
650 | 7 | |a Machine learning |2 fast | |
700 | 1 | |a Sagayam, K. Martin |4 edt | |
700 | 1 | |a Bhushan, Bharat |d 1949- |0 (DE-588)122258762 |4 edt | |
700 | 1 | |a Andrushia, A. Diana |4 edt | |
700 | 1 | |a Albuquerque, Victor Hugo C. de |0 (DE-588)1234429691 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-5068-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-7998-5275-9 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-5068-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032230938 | |
966 | e | |u https://doi.org/10.4018/978-1-7998-5068-7 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-5068-7 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-5068-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-5068-7 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Record in the Search Index
_version_ | 1818987141986779136 |
---|---|
any_adam_object | |
author2 | Sagayam, K. Martin Bhushan, Bharat 1949- Andrushia, A. Diana Albuquerque, Victor Hugo C. de |
author2_role | edt edt edt edt |
author2_variant | k m s km kms b b bb a d a ad ada v h c d a vhcd vhcda |
author_GND | (DE-588)122258762 (DE-588)1234429691 |
author_facet | Sagayam, K. Martin Bhushan, Bharat 1949- Andrushia, A. Diana Albuquerque, Victor Hugo C. de |
building | Verbundindex |
bvnumber | BV046822614 |
collection | ZDB-98-IGB |
contents | Deep learning strategies for security enhancement in wireless sensor networks / K. Martin Sagayam, Karunya Institute of Technology and Sciences, India, Bharat Bhushan, Birla Institute of Technology, Mesra, Ranchi, India, Diana Andrushia, Karunya Institute of Technology and Sciences, India, Victor Hugo C. de Albuquerque, Universidade de Fortaleza · Department of Computer Science, Brazil -- The threat of intelligent attackers using deep learning : The backoff attack case / Juan Parras, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain, Santiago Zazo, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain -- A Speed Control Based Big Data Collection Algorithm (SCBDCA) using clusters and portable sink WSNs / Rajkumar K, PSNA College of Engineering and Technology, India, Jeyalakshmi V, College of Engineering Guindy, Chennai, India, Ebenezer V, Karunya Institute of Technology and Sciences, India, Ramesh G, KLN College of Engineering, India |
ctrlnum | (OCoLC)1190919907 (DE-599)BVBBV046822614 |
doi_str_mv | 10.4018/978-1-7998-5068-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03107nam a2200445 c 4500</leader><controlfield tag="001">BV046822614</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211110 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200724s2020 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799850694</subfield><subfield code="9">978-1-7998-5069-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1190919907</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046822614</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deep learning strategies for security enhancement in wireless sensor networks</subfield><subfield code="c">K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Deep learning strategies for security enhancement in wireless sensor networks / K. Martin Sagayam, Karunya Institute of Technology and Sciences, India, Bharat Bhushan, Birla Institute of Technology, Mesra, Ranchi, India, Diana Andrushia, Karunya Institute of Technology and Sciences, India, Victor Hugo C. de Albuquerque, Universidade de Fortaleza · Department of Computer Science, Brazil -- The threat of intelligent attackers using deep learning : The backoff attack case / Juan Parras, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain, Santiago Zazo, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain -- A Speed Control Based Big Data Collection Algorithm (SCBDCA) using clusters and portable sink WSNs / Rajkumar K, PSNA College of Engineering and Technology, India, Jeyalakshmi V, College of Engineering Guindy, Chennai, India, Ebenezer V, Karunya Institute of Technology and Sciences, India, Ramesh G, KLN College of Engineering, India</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless sensor networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Machine learning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagayam, K. Martin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhushan, Bharat</subfield><subfield code="d">1949-</subfield><subfield code="0">(DE-588)122258762</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andrushia, A. Diana</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Albuquerque, Victor Hugo C. de</subfield><subfield code="0">(DE-588)1234429691</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-5068-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-7998-5275-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-5068-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032230938</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-5068-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-5068-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-5068-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-5068-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046822614 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:01:59Z |
institution | BVB |
isbn | 9781799850694 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032230938 |
oclc_num | 1190919907 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Deep learning strategies for security enhancement in wireless sensor networks K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Deep learning strategies for security enhancement in wireless sensor networks / K. Martin Sagayam, Karunya Institute of Technology and Sciences, India, Bharat Bhushan, Birla Institute of Technology, Mesra, Ranchi, India, Diana Andrushia, Karunya Institute of Technology and Sciences, India, Victor Hugo C. de Albuquerque, Universidade de Fortaleza · Department of Computer Science, Brazil -- The threat of intelligent attackers using deep learning : The backoff attack case / Juan Parras, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain, Santiago Zazo, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain -- A Speed Control Based Big Data Collection Algorithm (SCBDCA) using clusters and portable sink WSNs / Rajkumar K, PSNA College of Engineering and Technology, India, Jeyalakshmi V, College of Engineering Guindy, Chennai, India, Ebenezer V, Karunya Institute of Technology and Sciences, India, Ramesh G, KLN College of Engineering, India "This book explores the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques"-- Wireless sensor networks / Security measures Machine learning Machine learning fast Sagayam, K. Martin edt Bhushan, Bharat 1949- (DE-588)122258762 edt Andrushia, A. Diana edt Albuquerque, Victor Hugo C. de (DE-588)1234429691 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-5068-7 Erscheint auch als Druck-Ausgabe, softcover 978-1-7998-5275-9 https://doi.org/10.4018/978-1-7998-5068-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Deep learning strategies for security enhancement in wireless sensor networks Deep learning strategies for security enhancement in wireless sensor networks / K. Martin Sagayam, Karunya Institute of Technology and Sciences, India, Bharat Bhushan, Birla Institute of Technology, Mesra, Ranchi, India, Diana Andrushia, Karunya Institute of Technology and Sciences, India, Victor Hugo C. de Albuquerque, Universidade de Fortaleza · Department of Computer Science, Brazil -- The threat of intelligent attackers using deep learning : The backoff attack case / Juan Parras, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain, Santiago Zazo, Information Processing and Telecommunications Center, Universidad Politécnica de Madrid, Spain -- A Speed Control Based Big Data Collection Algorithm (SCBDCA) using clusters and portable sink WSNs / Rajkumar K, PSNA College of Engineering and Technology, India, Jeyalakshmi V, College of Engineering Guindy, Chennai, India, Ebenezer V, Karunya Institute of Technology and Sciences, India, Ramesh G, KLN College of Engineering, India Wireless sensor networks / Security measures Machine learning Machine learning fast |
title | Deep learning strategies for security enhancement in wireless sensor networks |
title_auth | Deep learning strategies for security enhancement in wireless sensor networks |
title_exact_search | Deep learning strategies for security enhancement in wireless sensor networks |
title_full | Deep learning strategies for security enhancement in wireless sensor networks K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque |
title_fullStr | Deep learning strategies for security enhancement in wireless sensor networks K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque |
title_full_unstemmed | Deep learning strategies for security enhancement in wireless sensor networks K. Martin Sagayam, Bharat Bhushan, A. Diana Andrushia, Victor Hugo C. de Albuquerque |
title_short | Deep learning strategies for security enhancement in wireless sensor networks |
title_sort | deep learning strategies for security enhancement in wireless sensor networks |
topic | Wireless sensor networks / Security measures Machine learning Machine learning fast |
topic_facet | Wireless sensor networks / Security measures Machine learning |
url | https://doi.org/10.4018/978-1-7998-5068-7 |
work_keys_str_mv | AT sagayamkmartin deeplearningstrategiesforsecurityenhancementinwirelesssensornetworks AT bhushanbharat deeplearningstrategiesforsecurityenhancementinwirelesssensornetworks AT andrushiaadiana deeplearningstrategiesforsecurityenhancementinwirelesssensornetworks AT albuquerquevictorhugocde deeplearningstrategiesforsecurityenhancementinwirelesssensornetworks |