Librería: Books From California, Simi Valley, CA, Estados Unidos de America
EUR 7,08
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritohardcover. Condición: Very Good.
Librería: WeBuyBooks, Rossendale, LANCS, Reino Unido
EUR 23,53
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 61,04
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.
Librería: Basi6 International, Irving, TX, Estados Unidos de America
EUR 96,93
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Librería: preigu, Osnabrück, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Detection of Primary User Emulation Attack in Cognitive Radio Networks based on TDOA using Novel Bat Algorithm | Aasia Rehman | Taschenbuch | 92 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668943407 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 126,29
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 125,87
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days. 557.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 140,60
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 135,15
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 125,86
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 127,14
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Publicado por Taylor & Francis Ltd, London, 2024
ISBN 10: 1032530189 ISBN 13: 9781032530185
Idioma: Inglés
Librería: Grand Eagle Retail, Fairfield, OH, Estados Unidos de America
EUR 150,20
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using machine learning and artificial intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, deep learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.This book:Covers emerging technologies of network attacks and management aspectsPresents artificial intelligence techniques for networks and resource optimization, and toward network automation, and securityShowcases recent industrial and technological aspects of next-generation networksIllustrates artificial intelligence techniques to mitigate cyber-attacks, authentication, and authorization challengesExplains smart, and real-time monitoring services, multimedia, cloud computing, and information processing methodologies in 5G networksIt is primarily for senior undergraduates, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 146,56
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 160,29
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New. 1st edition NO-PA16APR2015-KAP.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 156,60
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 183,87
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoHardcover. Condición: Brand New. 240 pages. 9.19x6.13x9.21 inches. In Stock.
Publicado por Taylor & Francis Ltd, London, 2024
ISBN 10: 1032530189 ISBN 13: 9781032530185
Idioma: Inglés
Librería: CitiRetail, Stevenage, Reino Unido
EUR 154,39
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using machine learning and artificial intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, deep learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.This book:Covers emerging technologies of network attacks and management aspectsPresents artificial intelligence techniques for networks and resource optimization, and toward network automation, and securityShowcases recent industrial and technological aspects of next-generation networksIllustrates artificial intelligence techniques to mitigate cyber-attacks, authentication, and authorization challengesExplains smart, and real-time monitoring services, multimedia, cloud computing, and information processing methodologies in 5G networksIt is primarily for senior undergraduates, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Publicado por Taylor & Francis Ltd, London, 2024
ISBN 10: 1032530189 ISBN 13: 9781032530185
Idioma: Inglés
Librería: AussieBookSeller, Truganina, VIC, Australia
EUR 180,25
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using machine learning and artificial intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, deep learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.This book:Covers emerging technologies of network attacks and management aspectsPresents artificial intelligence techniques for networks and resource optimization, and toward network automation, and securityShowcases recent industrial and technological aspects of next-generation networksIllustrates artificial intelligence techniques to mitigate cyber-attacks, authentication, and authorization challengesExplains smart, and real-time monitoring services, multimedia, cloud computing, and information processing methodologies in 5G networksIt is primarily for senior undergraduates, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Publicado por LAP LAMBERT Academic Publishing Apr 2018, 2018
ISBN 10: 613982723X ISBN 13: 9786139827237
Idioma: Inglés
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 35,90
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities. 84 pp. Englisch.
Publicado por LAP LAMBERT Academic Publishing, 2018
ISBN 10: 613982723X ISBN 13: 9786139827237
Idioma: Inglés
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 37,20
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function. 92 pp. Englisch.
Publicado por LAP LAMBERT Academic Publishing, 2018
ISBN 10: 613982723X ISBN 13: 9786139827237
Idioma: Inglés
Librería: moluna, Greven, Alemania
EUR 31,27
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Mapanga InnocentInnocent Mapanga was born in Zimbabwe. He received his B.Sc. Honors degree in Computer Science from Bindura University of Science Education, Zimbabwe, in 2008 and an MTech in Computer Science & Engineering from Delhi .
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
EUR 153,53
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 141,80
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: Brand New. 240 pages. 9.19x6.13x9.21 inches. In Stock. This item is printed on demand.
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
EUR 147,96
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Librería: moluna, Greven, Alemania
EUR 113,55
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Sagar Dhanraj PandeAssistant Professor, Department of Computer Science and Engineering, School of Engineering and Technology, Pimpri Chinchwad University (PCU), Pune, Maharashtra, India.Dr. Sagar Dhanraj Pande has exper.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 169,51
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoBuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.