|
![]() |
|||
|
||||
OverviewWireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. Full Product DetailsAuthor: Suhel Ahmed Khan (Indira Gandhi National Tribal Uni, Amarkantak) , Rajeev Kumar (Babu Banarasi Das Uni, India) , Omprakash Kaiwartya (Nottingham Trent Uni, UK) , Raees Ahmad Khan (Babasaheb Bhimrao Ambedkar Uni, Lucknow, India)Publisher: Taylor & Francis Ltd Imprint: CRC Press ISBN: 9781032347028ISBN 10: 1032347023 Pages: 296 Publication Date: 29 November 2024 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available ![]() This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsChapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks Prasannavenkatesan Theerthagiri Chapter 2: IoE Based Genetic Algorithms and its Requisition Neeraj Kumar Rathore, Shubhangi Pande Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le Chapter 4: Managing IoT –Cloud based Security: Needs and Importance Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal Chapter 5: Predictive Maintenance in Industry 4.0 Manoj Devare Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment Mahboob Alam, Mohd Amjad and Mohd. Naseem Chapter 8: The UAV Assisted Wireless Ad Hoc Network Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism Mohit Kumar, Ram Shringar Raw, Bharti Nagpal Chapter 11: Cryptography Techniques for Information Security: A Review Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello Chapter 13: A Cyber security Perspective of Machine Learning Algorithms Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha GorlaReviewsAuthor InformationSuhel Ahmed Khan, Raees Ahmad Khan Tab Content 6Author Website:Countries AvailableAll regions |