Wireless Communication in Cyber Security (eBook)
288 Seiten
John Wiley & Sons (Verlag)
978-1-119-91059-6 (ISBN)
Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.
Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies.
This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge. It focuses on providing exposure to readers about data security and privacy for wider domains.
The editorial and author team aims to address all possible solutions to the various problems faced in the newer techniques of wireless communications, improving the accuracies and reliability over the possible vulnerabilities and security threats to wireless communications. It is a must have for any engineer, scientist, or other industry professional working in this area.
S. Sountharrajan, PhD, is an associate professor in the School of Computing Science and Engineering at VIT Bhopal University. He is also the Division Head specializing in artificial intelligence and machine learning. He has published numerous papers in scientific journals and conferences and has delivered 32 guest lectures in reputed universities and institutions. R. Maheswar, PhD, is an associate professor at the School of Electrical & Electronics Engineering, VIT Bhopal University. He has over 18 years of teaching experience at various levels and has published 60 papers at scientific journals and conferences. Geetanjali Rathee, PhD, is an assistant professor in the Department of Computer Science and Engineering at Netaji Subhas University of Technology, New Delhi. She has six patents to her credit and has published over 40 papers in scientific journals and 15 papers at scholarly conferences. She has published book chapters, as well, and one book. She is a regular reviewer of various reputed journals. M. Akila is a professor in computer science. He has delivered 32 lectures at various universities, seminars, and conferences, and he has three patents to his credit. He is deeply involved in industrial and entrepreneurial activities.
Erscheint lt. Verlag | 30.10.2023 |
---|---|
Sprache | englisch |
Themenwelt | Technik ► Elektrotechnik / Energietechnik |
Schlagworte | Computer Science • Computer Security & Cryptography • Computersicherheit u. Kryptographie • Drahtlose Kommunikation • Electrical & Electronics Engineering • Elektrotechnik u. Elektronik • Informatik • Mobile & Wireless Communications • Technical Communication • Technische Dokumentation |
ISBN-10 | 1-119-91059-5 / 1119910595 |
ISBN-13 | 978-1-119-91059-6 / 9781119910596 |
Haben Sie eine Frage zum Produkt? |
Größe: 18,9 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich