Cargando…

Intelligent Network Management and Control Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Benmammar, Badr
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2021.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1244620232
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 210403s2021 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d OCLCQ  |d OCLCL  |d REDDC  |d OCLCO 
020 |a 9781119817833 
020 |a 1119817838 
035 |a (OCoLC)1244620232 
050 4 |a TK5105.59  |b .I584 2020 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20231120 
049 |a UAMI 
100 1 |a Benmammar, Badr. 
245 1 0 |a Intelligent Network Management and Control  |h [electronic resource] :  |b Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2021. 
300 |a 1 online resource (298 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats 
505 8 |a 1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking 
505 8 |a 2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction 
505 8 |a 3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References 
505 8 |a 4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction 
500 |a 5.2. Scientific and technical prerequisites. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Artificial intelligence. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet of things. 
650 6 |a Intelligence artificielle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Internet des objets. 
650 7 |a artificial intelligence.  |2 aat 
758 |i has work:  |a Intelligent network management and control (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG7rxVr78WbQ8HYbFvk3Bd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Benmammar, Badr  |t Intelligent Network Management and Control  |d Newark : John Wiley & Sons, Incorporated,c2021  |z 9781789450088 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6522998  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6522998 
994 |a 92  |b IZTAP