000 04955cam a2200529Ia 4500
001 on1243532948
003 OCoLC
005 20220711203652.0
006 m o d
007 cr un|---aucuu
008 210327s2021 enk ob 001 0 eng d
040 _aEBLCP
_beng
_cEBLCP
_dDG1
_dOCLCO
_dUKAHL
_dOCLCF
020 _a9781119817840
_q(electronic bk. : oBook)
020 _a1119817846
_q(electronic bk. : oBook)
020 _a9781119817833
020 _a1119817838
024 7 _a10.1002/9781119817840
_2doi
029 1 _aAU@
_b000069136573
035 _a(OCoLC)1243532948
050 4 _aTK5105.59
082 0 4 _a005.8
_223
049 _aMAIN
245 0 0 _aIntelligent network management and control :
_bintelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio /
_ccoordinated by Badr Benmammar.
260 _aLondon :
_bISTE, Ltd. ;
_aHoboken :
_bWiley,
_c2021.
300 _a1 online resource (298 p.)
500 _aDescription based upon print version of record.
505 0 _aCover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats
505 8 _a1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking
505 8 _a2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction
505 8 _a3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References
505 8 _a4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction
500 _a5.2. Scientific and technical prerequisites.
504 _aIncludes bibliographical references and index.
590 _bWiley Frontlist Obook All English 2021
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aArtificial intelligence.
_93407
650 0 _aInternet of things.
_94027
650 7 _aArtificial intelligence.
_2fast
_0(OCoLC)fst00817247
_93407
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_93969
650 7 _aInternet of things.
_2fast
_0(OCoLC)fst01894151
_94027
655 4 _aElectronic books.
_93294
700 1 _aBenmammar, Badr.
_99804
776 0 8 _iPrint version:
_aBenmammar, Badr
_tIntelligent Network Management and Control
_dNewark : John Wiley & Sons, Incorporated,c2021
_z9781789450088
856 4 0 _uhttps://doi.org/10.1002/9781119817840
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69511
_d69511