000 | 04955cam a2200529Ia 4500 | ||
---|---|---|---|
001 | on1243532948 | ||
003 | OCoLC | ||
005 | 20220711203652.0 | ||
006 | m o d | ||
007 | cr un|---aucuu | ||
008 | 210327s2021 enk ob 001 0 eng d | ||
040 |
_aEBLCP _beng _cEBLCP _dDG1 _dOCLCO _dUKAHL _dOCLCF |
||
020 |
_a9781119817840 _q(electronic bk. : oBook) |
||
020 |
_a1119817846 _q(electronic bk. : oBook) |
||
020 | _a9781119817833 | ||
020 | _a1119817838 | ||
024 | 7 |
_a10.1002/9781119817840 _2doi |
|
029 | 1 |
_aAU@ _b000069136573 |
|
035 | _a(OCoLC)1243532948 | ||
050 | 4 | _aTK5105.59 | |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aIntelligent network management and control : _bintelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio / _ccoordinated by Badr Benmammar. |
260 |
_aLondon : _bISTE, Ltd. ; _aHoboken : _bWiley, _c2021. |
||
300 | _a1 online resource (298 p.) | ||
500 | _aDescription based upon print version of record. | ||
505 | 0 | _aCover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats | |
505 | 8 | _a1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking | |
505 | 8 | _a2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction | |
505 | 8 | _a3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References | |
505 | 8 | _a4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction | |
500 | _a5.2. Scientific and technical prerequisites. | ||
504 | _aIncludes bibliographical references and index. | ||
590 | _bWiley Frontlist Obook All English 2021 | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aInternet of things. _94027 |
|
650 | 7 |
_aArtificial intelligence. _2fast _0(OCoLC)fst00817247 _93407 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _93969 |
|
650 | 7 |
_aInternet of things. _2fast _0(OCoLC)fst01894151 _94027 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aBenmammar, Badr. _99804 |
|
776 | 0 | 8 |
_iPrint version: _aBenmammar, Badr _tIntelligent Network Management and Control _dNewark : John Wiley & Sons, Incorporated,c2021 _z9781789450088 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119817840 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69511 _d69511 |