Gespeichert in:
Weitere beteiligte Personen: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
CRC PRESS
2022
|
Schriftenreihe: | Wireless communications and networking technologies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000689020/?ar |
Zusammenfassung: | Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. |
Umfang: | 1 Online-Ressource |
ISBN: | 9781000688993 1000688992 9781003323426 1003323421 9781000689020 1000689026 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-098490486 | ||
003 | DE-627-1 | ||
005 | 20240228121752.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231127s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781000688993 |c electronic bk. |9 978-1-000-68899-3 | ||
020 | |a 1000688992 |c electronic bk. |9 1-000-68899-2 | ||
020 | |a 9781003323426 |c electronic bk. |9 978-1-003-32342-6 | ||
020 | |a 1003323421 |c electronic bk. |9 1-003-32342-1 | ||
020 | |a 9781000689020 |c electronic bk. : EPUB |9 978-1-000-68902-0 | ||
020 | |a 1000689026 |c electronic bk. : EPUB |9 1-000-68902-6 | ||
035 | |a (DE-627-1)098490486 | ||
035 | |a (DE-599)KEP098490486 | ||
035 | |a (ORHE)9781000689020 | ||
035 | |a (DE-627-1)098490486 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a TJFM |2 bicssc | |
082 | 0 | |a 621.384 |2 23 | |
245 | 0 | 0 | |a COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b CRC PRESS |c 2022 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Wireless communications and networking technologies | |
520 | |a Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. | ||
650 | 0 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Transmission sans fil ; Sécurité ; Mesures | |
650 | 4 | |a TECHNOLOGY / Telecommunications | |
650 | 4 | |a TECHNOLOGY / Electronics / General | |
650 | 4 | |a Wireless communication systems ; Security measures | |
700 | 1 | |a Khan, Suhel Ahmed |e HerausgeberIn |4 edt | |
700 | 1 | |a Kumar, Rajeev |e HerausgeberIn |4 edt | |
700 | 1 | |a Kaiwartya, Omprakash |d 1981- |e HerausgeberIn |4 edt | |
700 | 1 | |a Khan, R. A. |e HerausgeberIn |4 edt | |
700 | 1 | |a Faisal, M. |e HerausgeberIn |4 edt | |
776 | 1 | |z 103208166X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 103208166X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000689020/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-098490486 |
---|---|
_version_ | 1835903253611544576 |
adam_text | |
any_adam_object | |
author2 | Khan, Suhel Ahmed Kumar, Rajeev Kaiwartya, Omprakash 1981- Khan, R. A. Faisal, M. |
author2_role | edt edt edt edt edt |
author2_variant | s a k sa sak r k rk o k ok r a k ra rak m f mf |
author_facet | Khan, Suhel Ahmed Kumar, Rajeev Kaiwartya, Omprakash 1981- Khan, R. A. Faisal, M. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)098490486 (DE-599)KEP098490486 (ORHE)9781000689020 |
dewey-full | 621.384 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.384 |
dewey-search | 621.384 |
dewey-sort | 3621.384 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04170cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-098490486</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121752.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231127s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000688993</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-68899-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000688992</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-68899-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003323426</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-32342-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003323421</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-32342-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000689020</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-000-68902-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000689026</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-000-68902-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)098490486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP098490486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000689020</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)098490486</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TJFM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.384</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">CRC PRESS</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wireless communications and networking technologies</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY / Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY / Electronics / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Suhel Ahmed</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Rajeev</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaiwartya, Omprakash</subfield><subfield code="d">1981-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, R. A.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Faisal, M.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">103208166X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">103208166X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000689020/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-098490486 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:16:20Z |
institution | BVB |
isbn | 9781000688993 1000688992 9781003323426 1003323421 9781000689020 1000689026 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC PRESS |
record_format | marc |
series2 | Wireless communications and networking technologies |
spelling | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS [Erscheinungsort nicht ermittelbar] CRC PRESS 2022 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Wireless communications and networking technologies Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. Wireless communication systems Security measures Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY / Telecommunications TECHNOLOGY / Electronics / General Wireless communication systems ; Security measures Khan, Suhel Ahmed HerausgeberIn edt Kumar, Rajeev HerausgeberIn edt Kaiwartya, Omprakash 1981- HerausgeberIn edt Khan, R. A. HerausgeberIn edt Faisal, M. HerausgeberIn edt 103208166X Erscheint auch als Druck-Ausgabe 103208166X |
spellingShingle | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS Wireless communication systems Security measures Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY / Telecommunications TECHNOLOGY / Electronics / General Wireless communication systems ; Security measures |
title | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_auth | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_exact_search | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_full | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_fullStr | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_full_unstemmed | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_short | COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS |
title_sort | computational intelligent security in wireless communications |
topic | Wireless communication systems Security measures Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY / Telecommunications TECHNOLOGY / Electronics / General Wireless communication systems ; Security measures |
topic_facet | Wireless communication systems Security measures Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY / Telecommunications TECHNOLOGY / Electronics / General Wireless communication systems ; Security measures |
work_keys_str_mv | AT khansuhelahmed computationalintelligentsecurityinwirelesscommunications AT kumarrajeev computationalintelligentsecurityinwirelesscommunications AT kaiwartyaomprakash computationalintelligentsecurityinwirelesscommunications AT khanra computationalintelligentsecurityinwirelesscommunications AT faisalm computationalintelligentsecurityinwirelesscommunications |