Cover image for Wireless communication security : mobile and network security protocols
Title:
Wireless communication security : mobile and network security protocols
Author:
Bharti, Manisha, editor.
ISBN:
9781119777465
Physical Description:
1 online resource.
Series:
Advances in data engineering and machine learning
Contents:
Front Matter -- M2M in 5G Cellular Networks / Kiran Ahuja, Indu Bala -- MAC Layer Protocol for Wireless Security / Sushmita Kumari, Manisha Bharti -- Enhanced Image Security Through Hybrid Approach / Shaifali M Arora, Poonam Kadian -- Quantum Computing / Manisha Bharti, Tanvika Garg -- Feature Engineering for Flow-Based IDS / Rahul B Adhao, Vinod K Pachghare -- Environmental Aware Thermal (EAT) Routing Protocol for Wireless Sensor Networks / B Banuselvasaraswathy, Vimalathithan Rathinasabapathy -- A Comprehensive Study of Intrusion Detection and Prevention Systems / Bhoopesh Singh Bhati, Dikshita, Nitesh Singh Bhati, Garvit Chugh -- Hardware Devices Integration With IoT / Sushant Kumar, Saurabh Mukherjee -- Depth Analysis On DoS & DDoS Attacks / Gaurav Nayak, Anjana Mishra, Uditman Samal, Brojo Kishore Mishra -- SQL Injection Attack on Database System / Mohit Kumar -- Machine Learning Techniques for Face Authentication System for Security Purposes / Vibhuti Jain, Madhavendra Singh, Jagannath Jayanti -- Estimation of Computation Time for Software-Defined Networking-Based Data Traffic Offloading System in Heterogeneous Network / Shashila S Abayagunawardhana, Malka N Halgamuge, Charitha Subhashi Jayasekara -- About the Editors -- Index -- Also of Interest
Abstract:
Covering a broad range of topics in wireless communication security and its solutions, this outstanding new volume is of great interest to engineers, scientists, and students from a variety of backgrounds and interests. Focusing on providing the theory of wireless communication within the framework of its practical applications. Wireless Communication Security has been divided into five units. The first unit presents the different protocols and standards for developing a real-time wireless communication security. The second unit presents different widely accepted networks, which are the core of wireless communication security. Unit three presents the various device and network controlling methodologies. Unit four presents the various high performance and computationally efficient algorithms for efficient and scalable implementation of network protocols, and the last unit presents the leading innovations and variety of usage of wireless communication security. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in these areas, this is a must-have for any library.
Local Note:
John Wiley and Sons
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 598156-1001 TK5103.2 .W57 2023
Searching...

On Order