Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wire
Computational Intelligent Security in Wireless Communications
โ Scribed by Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal
- Publisher
- CRC Press
- Year
- 2023
- Tongue
- English
- Leaves
- 296
- Series
- Wireless Communications and Networking Technologies
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.
It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.
The book:
- Discusses computational algorithms for system modeling and optimization in security perspective
- Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies
- Explores a group of practical research problems where security experts can help develop new data-driven methodologies
- Covers application on artificial intelligence and wireless communication security risk perspective
The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
๐ SIMILAR VOLUMES
<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco
This cutting-edge resource offers practical overview of cognitive radio - a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external a
<p><p>This book highlights the emerging field of intelligent computing and developing smart systems. It includes chapters discussing the outcome of challenging research related to distributed computing, smart machines and their security related research, and also covers next-generation communication
<span>WIRELESS COMMUNICATION </span><span>in</span><span> CYBERSECURITY</span><p><span>Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, an
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a so