Intelligent network management and control : (Record no. 69511)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04955cam a2200529Ia 4500 |
001 - CONTROL NUMBER | |
control field | on1243532948 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203652.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210327s2021 enk ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119817840 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119817846 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119817833 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119817838 |
029 1# - (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000069136573 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 00 - TITLE STATEMENT | |
Title | Intelligent network management and control : |
Sub Title | intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio / |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | London : |
Publisher | ISTE, Ltd. ; |
Place of publication | Hoboken : |
Publisher | Wiley, |
Year of publication | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (298 p.) |
500 ## - GENERAL NOTE | |
Remark 1 | Description based upon print version of record. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction |
500 ## - GENERAL NOTE | |
Remark 1 | 5.2. Scientific and technical prerequisites. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Benmammar, Badr. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119817840 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of things. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
-- | (OCoLC)fst00817247 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
-- | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of things. |
-- | (OCoLC)fst01894151 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.