• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Networks Attack Detection on 5G Networks using Data Mining Techniques

    Networks Attack Detection on 5G Networks using Data Mining Techniques by Pande, Sagar Dhanraj; Khamparia, Aditya;

    Series: Wireless Communications and Networking Technologies;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 99.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        47 770 Ft (45 495 Ft + 5% VAT)
      • Discount 20% (cc. 9 554 Ft off)
      • Discounted price 38 216 Ft (36 396 Ft + 5% VAT)

    47 770 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher CRC Press
    • Date of Publication 23 April 2024

    • ISBN 9781032530185
    • Binding Hardback
    • No. of pages216 pages
    • Size 234x156 mm
    • Weight 560 g
    • Language English
    • Illustrations 73 Illustrations, black & white; 5 Halftones, black & white; 68 Line drawings, black & white; 43 Tables, black & white
    • 556

    Categories

    Short description:

    This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.

    More

    Long description:

    Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using machine learning and artificial intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, deep learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.


    This book:



    • Covers emerging technologies of network attacks and management aspects

    • Presents artificial intelligence techniques for networks and resource optimization, and toward network automation, and security

    • Showcases recent industrial and technological aspects of next-generation networks

    • Illustrates artificial intelligence techniques to mitigate cyber-attacks, authentication, and authorization challenges

    • Explains smart, and real-time monitoring services, multimedia, cloud computing, and information processing methodologies in 5G networks

    • It is primarily for senior undergraduates, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology

    More

    Table of Contents:

    1. Enhancing 5G and IoT Network Security: A Multi-Model Deep Learning Approach for Attack Classification. 2. Dynamic Deployment and Traffic Scheduling of UPF in 5G Networks. 3. Spatial Federated Learning and Blockchain based 5G Communication Model for Hiding Confidential Information. 4. Mining Intelligence Hierarchical Feature for Malware Detection over 5G Network. 5. Enhancing Reliability and Security of Power Monitoring Systems in the Era of 5G Networks. 6. Passive Voice in 5G Mobile Edge Computing: Optimizing Energy Efficiency and Resource Utilization. 7. Exchange Matching Algorithm for Low-Complexity Traffic Scheduling for 5G Fronthaul Networks. 8. Attack Path Discovery in Dynamic Network Environments for Automated Penetration Testing over 5G Networks. 9. Enhancing Electric Vehicle Charging Efficiency in Urban Areas with 5G Network Integration and Network Attack Mitigation. 10. Next-Generation Intrusion Detection System for 5G Networks with Enhanced Security Using Updated Datasets

    More
    Recently viewed
    previous
    20% %discount
    Networks Attack Detection on 5G Networks using Data Mining Techniques

    Networks Attack Detection on 5G Networks using Data Mining Techniques

    Pande, Sagar Dhanraj; Khamparia, Aditya; (ed.)

    47 770 HUF

    38 216 HUF

    20% %discount
    Networks Attack Detection on 5G Networks using Data Mining Techniques

    Advanced Methods in Statistics, Data Science and Related Applications: SIS 2022, Caserta, Italy, June 22–24

    Bini, Matilde; Balzanella, Antonio; Masserini, Lucio; Verde, Rosanna

    71 001 HUF

    56 801 HUF

    next