Personnaliser

OK

Cyber Security for Next-Generation Computing Technologies -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

92,35 €

Produit Neuf

  • Ou 23,09 € /mois

    • Livraison à 0,01 €
    • Livré entre le 11 et le 18 mai
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032519005_dbm

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Cyber Security For Next - Generation Computing Technologies de Format Broché  - Livre Encyclopédies, Dictionnaires

        Note : 0 0 avis sur Cyber Security For Next - Generation Computing Technologies de Format Broché  - Livre Encyclopédies, Dictionnaires

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Cyber Security For Next - Generation Computing Technologies de Format Broché

         - Livre Encyclopédies, Dictionnaires

        Livre Encyclopédies, Dictionnaires - 01/07/2025 - Broché - Langue : Anglais

        . .

      • Editeur : Crc Press
      • Langue : Anglais
      • Parution : 01/07/2025
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 330.0
      • ISBN : 9781032519005



      • Résumé :

        Chapter 1 Cyber Security: Future Trends and Solutions

        Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar

        Chapter 2 Security and Intelligent Management: Survey

        Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha

        Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security

        Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah

        Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks

        Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami

        Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape

        Zakaria Abou El Houda

        Chapter 6 Layer-Based Security Threats in IoT Networks

        Muna Muhammad, Ahthasham Sajid, and Hira Arshad

        Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm

        Muhammad Tehmasib Ali Tashfeen

        Chapter 8 Signature-Based Intrusion Detection System for IoT

        Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz

        Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset

        Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub

        Chapter 10 Cyber Security for Edge/Fog Computing Applications

        Hanane Lamaazi

        Chapter 11 Cyber Attacks Against Intelligent Transportation Systems

        Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid

        Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks

        Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia

        Chapter 13 Cyber Attack Detection Analysis Using Machine Learning

        for IoT-Based UAV Network

        Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan

        Chapter 14 Blockchain Solutions for Cyber Criminals

        Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni

        Chapter 15 Blockchain Security Measures to Combat Cyber Crime Rahmeh Ibrahim and Qasem Abu Al-Haija

        Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective

        Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan

        ...

        Biographie:
        he has published some research papers at international level. More interestingly he recently introduced a novel routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interest includes Network System Security, Intrusion Detection, Intrusion Prevention, cryptography, Optimization techniques, WSN, IoT, UAV's, Mobile Ad Hoc Networks (MANETS), Flying Ad Hoc Networks, and Machine Learning. He has served international conferences as Technical program committee member which include, EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan and 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018 and now recently working on the same level at International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN'21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN 2021) which is co-organized in November 1-4, 2021, Leuven, Belgium. He has published more than 20 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts) and 3 edited books.

        Dr. Mariya Ouaissa is currently a Professor at Institute Specializing in New Information and Communication Technologies, Researcher Associate and practitioner with industry and academic experience. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center. She was working for School of Technology of Meknes Morocco as a Visiting Professor from 2013 to 2021. She is member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an ACM Professional Member. She is Expert Reviewer with Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical program and organizer committees of several conferences and events and has organized many Symposiums/Workshops/Conferences as a General Chair also as a reviewer of numerous international journals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), 10 edited books, and 8 special issue as guest editor.

        Dr. Mariyam Ouaissa is currently a Professor at Institute specializing in new information and communication technologies, Researcher Associate and Consultant Trainer in Computer Science and Networks. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa's research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control. She is serving as a reviewer for international journals and conferences including as IEEE Access, Wireless Communications and Mobile Computing. Since 2020, she is a member of...

        Sommaire:
        This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations....

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com