Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Wireless communication security / edited by Manju Khari, Manisha Bharti, and M. Niranjanamurthy.

Contributor(s): Material type: TextTextSeries: Advances in data engineering and machine learningPublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., 2023Description: xv, 267 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119777144
Other title:
  • Wireless communication security : mobile and network security protocols
Subject(s): DDC classification:
  • 005.8 W743 23
LOC classification:
  • TK5103.2
Contents:
M2M in 5G cellular networks : challenges, proposed solutions, and future directions -- MAC layer protocol for wireless security -- Enhanced image security through hybrid approach: protect your copyright over digital images -- Quantum computing -- Feature engineering for flow-based IDS -- A comprehensive study of intrusion detection and prevention systems -- Hardware devices integration with IoT -- Depth analysis on DoS & DDoS attacks -- SQL injection attack on database system -- Machine learning techniques for face authentication system for security purposes -- Estimation of computation time for software-defined -- Networking-based data traffic offloading system in heterogenous network.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 W743 2023 (Browse shelf(Opens below)) 1-1 Available 029157

Includes bibliographical references and index.

M2M in 5G cellular networks : challenges, proposed solutions, and future directions -- MAC layer protocol for wireless security -- Enhanced image security through hybrid approach: protect your copyright over digital images -- Quantum computing -- Feature engineering for flow-based IDS -- A comprehensive study of intrusion detection and prevention systems -- Hardware devices integration with IoT -- Depth analysis on DoS & DDoS attacks -- SQL injection attack on database system -- Machine learning techniques for face authentication system for security purposes -- Estimation of computation time for software-defined -- Networking-based data traffic offloading system in heterogenous network.

There are no comments on this title.

to post a comment.