×







We sell 100% Genuine & New Books only!

Computational Intelligent Security in Wireless Communications 1st Edition 2022 Hardbound at Meripustak

Computational Intelligent Security in Wireless Communications 1st Edition 2022 Hardbound by Khan, Suhel Ahmed, Taylor and Francis Ltd

Books from same Author: Khan, Suhel Ahmed

Books from same Publisher: Taylor and Francis Ltd

Related Category: Author List / Publisher List


  • Price: ₹ 12111.00/- [ 17.00% off ]

    Seller Price: ₹ 10052.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Khan, Suhel Ahmed
    PublisherTaylor and Francis Ltd
    Edition1st Edition
    ISBN9781032081663
    Pages296
    BindingHardbound
    LanguageEnglish
    Publish YearSeptember 2022

    Description

    Taylor and Francis Ltd Computational Intelligent Security in Wireless Communications 1st Edition 2022 Hardbound by Khan, Suhel Ahmed

    Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security._x000D__x000D_It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval._x000D__x000D_The book:_x000D__x000D__x000D__x000D_Discusses computational algorithms for system modeling and optimization in security perspective_x000D_Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies_x000D_Explores a group of practical research problems where security experts can help develop new data-driven methodologies_x000D_Covers application on artificial intelligence and wireless communication security risk perspective_x000D__x000D_The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering._x000D__x000D_The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering._x000D_ _x000D_ Chapter 1: An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks_x000D_ Prasannavenkatesan Theerthagiri_x000D_ _x000D_ Chapter 2: IoE Based Genetic Algorithms and its Requisition_x000D_ Neeraj Kumar Rathore, Shubhangi Pande_x000D_ _x000D_ Chapter 3: A Framework for Hybrid WBSN-VANET based Health Monitoring System_x000D_ Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le_x000D_ _x000D_ Chapter 4: Managing IoT -Cloud based Security: Needs and Importance_x000D_ Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal_x000D_ _x000D_ Chapter 5: Predictive Maintenance in Industry 4.0_x000D_ Manoj Devare_x000D_ _x000D_ Chapter 6: Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting_x000D_ Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma_x000D_ _x000D_ Chapter 7: Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment_x000D_ Mahboob Alam, Mohd Amjad and Mohd. Naseem_x000D_ _x000D_ Chapter 8: The UAV Assisted Wireless Ad Hoc Network_x000D_ Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan_x000D_ _x000D_ Chapter 9: Integrating Cybernetics into Healthcare System: Security Perspective_x000D_ Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak_x000D_ _x000D_ Chapter 10: Threats and Countermeasures in Digital Crime and Cyber Terrorism_x000D_ Mohit Kumar, Ram Shringar Raw, Bharti Nagpal_x000D_ _x000D_ Chapter 11: Cryptography Techniques for Information Security: A Review_x000D_ Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav_x000D_ _x000D_ Chapter 12: A Critical Analysis of Cyber Threats and Its Global Impact_x000D_ Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello_x000D_ _x000D_ Chapter 13: A Cyber security Perspective of Machine Learning Algorithms_x000D_ Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal_x000D_ _x000D_ Chapter 14: Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector_x000D_ Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla_x000D_



    Book Successfully Added To Your Cart