Intelligent network management and control : (Record no. 69511)

000 -LEADER
fixed length control field 04955cam a2200529Ia 4500
001 - CONTROL NUMBER
control field on1243532948
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203652.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210327s2021 enk ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119817840
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119817846
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119817833
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119817838
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000069136573
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 00 - TITLE STATEMENT
Title Intelligent network management and control :
Sub Title intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication London :
Publisher ISTE, Ltd. ;
Place of publication Hoboken :
Publisher Wiley,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (298 p.)
500 ## - GENERAL NOTE
Remark 1 Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats
505 8# - FORMATTED CONTENTS NOTE
Remark 2 1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking
505 8# - FORMATTED CONTENTS NOTE
Remark 2 2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction
505 8# - FORMATTED CONTENTS NOTE
Remark 2 3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References
505 8# - FORMATTED CONTENTS NOTE
Remark 2 4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction
500 ## - GENERAL NOTE
Remark 1 5.2. Scientific and technical prerequisites.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Benmammar, Badr.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119817840
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet of things.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
-- (OCoLC)fst00817247
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet of things.
-- (OCoLC)fst01894151
994 ## -
-- 92
-- DG1

No items available.