Computational Intelligent Security in Wireless Communications

· · · ·
· CRC Press
5,0
1 avis
E-book
296
Pages
Éligible
Les notes et avis ne sont pas vérifiés. En savoir plus

À propos de cet e-book

Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.

It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.

The book:

  • Discusses computational algorithms for system modeling and optimization in security perspective
  • Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies
  • Explores a group of practical research problems where security experts can help develop new data-driven methodologies
  • Covers application on artificial intelligence and wireless communication security risk perspective

The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

Notes et avis

5,0
1 avis

À propos de l'auteur

Suhel Ahmed Khan, Raees Ahmad Khan

Donner une note à cet e-book

Dites-nous ce que vous en pensez.

Informations sur la lecture

Smartphones et tablettes
Installez l'application Google Play Livres pour Android et iPad ou iPhone. Elle se synchronise automatiquement avec votre compte et vous permet de lire des livres en ligne ou hors connexion, où que vous soyez.
Ordinateurs portables et de bureau
Vous pouvez écouter les livres audio achetés sur Google Play à l'aide du navigateur Web de votre ordinateur.
Liseuses et autres appareils
Pour lire sur des appareils e-Ink, comme les liseuses Kobo, vous devez télécharger un fichier et le transférer sur l'appareil en question. Suivez les instructions détaillées du Centre d'aide pour transférer les fichiers sur les liseuses compatibles.