Computational Intelligent Security in Wireless Communications

Computational Intelligent Security in Wireless Communications

Khan, Raees Ahmad; Kumar, Rajeev; Faisal, Mohammad; Khan, Suhel Ahmed; Kaiwartya, Omprakash

Taylor & Francis Ltd

11/2024

296

Mole

9781032347028

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks
Prasannavenkatesan Theerthagiri

Chapter 2: IoE Based Genetic Algorithms and its Requisition
Neeraj Kumar Rathore, Shubhangi Pande

Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System
Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le

Chapter 4: Managing IoT -Cloud based Security: Needs and Importance
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal

Chapter 5: Predictive Maintenance in Industry 4.0
Manoj Devare

Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma

Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment
Mahboob Alam, Mohd Amjad and Mohd. Naseem

Chapter 8: The UAV Assisted Wireless Ad Hoc Network
Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan

Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak

Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism
Mohit Kumar, Ram Shringar Raw, Bharti Nagpal

Chapter 11: Cryptography Techniques for Information Security: A Review
Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav

Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello

Chapter 13: A Cyber security Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal

Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector
Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla
Data Analytics;Wireless Network;Human-Machine Interaction;Intelligent Information Retrieval;Artificial Intelligence;Internet of Things;Resource Poor Settings;Block Cipher;Ad Hoc Network;Cyber Security;DES;AODV;Cyber Threat;Unsupervised Ml;Selfish Nodes;IoT Device;Digital Forensics;Misbehaving Node;Cloud Computing;ECC;Supervise Ml;Sentiment Analysis;NB Model;Mobile Base Station;Industrial IoT;Multiple UAVs;Data Set;Distributed Analytics Approaches;Ground Nodes;Routing Protocol;Cryptography Techniques