|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1244620232 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210403s2021 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d OCLCQ
|d OCLCL
|d REDDC
|d OCLCO
|
020 |
|
|
|a 9781119817833
|
020 |
|
|
|a 1119817838
|
035 |
|
|
|a (OCoLC)1244620232
|
050 |
|
4 |
|a TK5105.59
|b .I584 2020
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20231120
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Benmammar, Badr.
|
245 |
1 |
0 |
|a Intelligent Network Management and Control
|h [electronic resource] :
|b Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio.
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2021.
|
300 |
|
|
|a 1 online resource (298 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats
|
505 |
8 |
|
|a 1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking
|
505 |
8 |
|
|a 2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction
|
505 |
8 |
|
|a 3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References
|
505 |
8 |
|
|a 4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction
|
500 |
|
|
|a 5.2. Scientific and technical prerequisites.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
6 |
|a Intelligence artificielle.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet des objets.
|
650 |
|
7 |
|a artificial intelligence.
|2 aat
|
758 |
|
|
|i has work:
|a Intelligent network management and control (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG7rxVr78WbQ8HYbFvk3Bd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Benmammar, Badr
|t Intelligent Network Management and Control
|d Newark : John Wiley & Sons, Incorporated,c2021
|z 9781789450088
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6522998
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6522998
|
994 |
|
|
|a 92
|b IZTAP
|