• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Computational Intelligent Security in Wireless Communications

    Computational Intelligent Security in Wireless Communications by Khan, Suhel Ahmed; Kumar, Rajeev; Kaiwartya, Omprakash;

    Sorozatcím: Wireless Communications and Networking Technologies;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 120.00
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        57 330 Ft (54 600 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 11 466 Ft off)
      • Kedvezményes ár 45 864 Ft (43 680 Ft + 5% áfa)

    57 330 Ft

    db

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadás sorszáma 1
    • Kiadó CRC Press
    • Megjelenés dátuma 2023. március 21.

    • ISBN 9781032081663
    • Kötéstípus Keménykötés
    • Terjedelem296 oldal
    • Méret 234x156 mm
    • Súly 710 g
    • Nyelv angol
    • Illusztrációk 14 Illustrations, black & white; 77 Illustrations, color; 29 Halftones, black & white; 62 Line drawings, black & white; 33 Tables, black & white
    • 447

    Kategóriák

    Rövid leírás:

    This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

    Több

    Hosszú leírás:

    Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.


    It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.


    The book:



    • Discusses computational algorithms for system modeling and optimization in security perspective

    • Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies

    • Explores a group of practical research problems where security experts can help develop new data-driven methodologies

    • Covers application on artificial intelligence and wireless communication security risk perspective

    The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.


    The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

    Több

    Tartalomjegyzék:

    Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks
    Prasannavenkatesan Theerthagiri


    Chapter 2: IoE Based Genetic Algorithms and its Requisition
    Neeraj Kumar Rathore, Shubhangi Pande


    Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
    Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le


    Chapter 4: Managing IoT –Cloud based Security: Needs and Importance
    Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal


    Chapter 5: Predictive Maintenance in Industry 4.0
    Manoj Devare


    Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting
    Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma


    Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment
    Mahboob Alam, Mohd Amjad and Mohd. Naseem


    Chapter 8: The UAV Assisted Wireless Ad Hoc Network
    Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan


    Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective
    Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak


    Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism
    Mohit Kumar, Ram Shringar Raw, Bharti Nagpal


    Chapter 11: Cryptography Techniques for Information Security: A Review
    Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav


    Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
    Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello


    Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
    Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal


    Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector
    Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla

    Több
    Mostanában megtekintett
    previous
    20% %kedvezmény
    Computational Intelligent Security in Wireless Communications

    Computational Intelligent Security in Wireless Communications

    Khan, Suhel Ahmed; Kumar, Rajeev; Kaiwartya, Omprakash;(ed.)

    57 330 Ft

    45 864 Ft

    Computational Intelligent Security in Wireless Communications

    Handbook of Research on Advanced Intelligent Control Engineering and Automation

    Azar, Ahmad Taher; Vaidyanathan, Sundarapandian; (ed.)

    150 139 Ft

    138 128 Ft

    20% %kedvezmény
    Computational Intelligent Security in Wireless Communications

    Positioning and Sensing Over Wireless Networks

    Yang, Yang; Chen, Mingzhe; Liu, Fan; Mao, Shiwen

    53 249 Ft

    42 600 Ft

    20% %kedvezmény
    Computational Intelligent Security in Wireless Communications

    Brahms in Context

    Loges, Natasha; Hamilton, Katy; (ed.)

    12 421 Ft

    9 937 Ft

    Computational Intelligent Security in Wireless Communications

    Imaging Informatics: An Introduction: for the Medical Imaging Professional

    Seeram, Euclid; McEntee, Mark; Stewart, Kori L.

    28 198 Ft

    24 533 Ft

    20% %kedvezmény
    Computational Intelligent Security in Wireless Communications

    Numerical Methods for Flows: FEF 2017 Selected Contributions

    van Brummelen, Harald; Corsini, Alessandro; Perotto, Simona; Rozza, Gianluigi

    44 374 Ft

    35 499 Ft

    20% %kedvezmény
    Computational Intelligent Security in Wireless Communications

    Wireless Ad-hoc and Sensor Networks: Architecture, Protocols, and Applications

    Singh, Pawan; Kumar, Sudesh; Gupta, Sachin Kumar;(ed.)

    71 662 Ft

    57 330 Ft

    next