-
DISPONIBILITÀ IMMEDIATA
{{/disponibilitaBox}}
-
{{speseGratisLibroBox}}
{{/noEbook}}
{{^noEbook}}
-
Libro
-
Advancing Computational Intelligence Techniques for Security Systems Design
sharma uzzal (curatore); astya parmanand (curatore); baliyan anupam (curatore); krit salah-ddine (curatore); jain vishal (curatore); khan mohammad zubair (curatore)
129,98 €
123,48 €
{{{disponibilita}}}
NOTE EDITORE
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable. Key features: Focuses on the computational intelligence techniques of security system design Covers applications and algorithms of discussed computational intelligence techniques Includes convergence-based and enterprise integrated security systems with their applications Explains emerging laws, policies, and tools affecting the landscape of cyber security Discusses application of sensors toward the design of security systems This book will be useful for graduate students and researchers in electrical, computer engineering, security system design and engineering.SOMMARIO
1. Analysis of Various Security Defence Frameworks in Different Application Areas of Cyber-Physical SystemGyanesh Gyanesh, D L Kavya Reddy, Durgam Radha Sayi Soumya, Subrata Sahana and Nitin Rakesh 2. Role and Development of Security Architecture and Models in Software systemsMaushumi Lahon and Uzzal Sharma 3. Role of IoT in the Design of a Security SystemKeshav Kaushik 4. IoT-Tangle Enhanced Security SystemsShyam Raj S, Falak Bhardwaj and Arti Saxena 5. Recent Trends in 5G and Machine Learning, Challenges and OpportunitiesKannadhasan S, Nagarajan R and Shanmuganantham M 6. Hardware Trojans in Microfluidic Biochips: Principles and PracticeDilip Kumar Dalei and Debasis Gountia 7. Benefits & Risks of Cloud ComputingOsheen Oberoi, Sahil Raj and Vishal Goyal 8. Intrusion Detection Systems for Trending Cyber-attacksShahbaz Ahmad Khanday, Dr. Hoor Fatima and Dr. Nitin Rakesh 9. War of Control Hijacking: Attacks and Defenses Ragini Karwayun and Monka Sainger 10. IOT Based Lightweight Cryptographic SchemesDhirendra Siddharth, Priti Singh and Dilip Kumar J SainiAUTORE
Uzzal Sharma is currently an Assistant Professor (Selection Grade), Department of Computer Applications, School of Technology, Assam Don Bosco University, Guwahati, India. Parmanand Astya, PhD, is affiliated with Sharda University, Greater Noida, U. P., India. Anupam Baliyan is working as a Professor at University Institute of Engineering & Technology, Chitkara University, Punjab. Salah-ddine Krit is an Associate Professor at the Polydisciplinary Faculty of Ouarzazate, Ibn Zohr University Agadir Morocco, Dr. Krit is currently The Director of Engineering Science and Energies Laboratory and The Chief of Department of Mathematics, Informatics and Management. Vishal Jain, PhD, is presently working as an Associate Professor at the Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, U. P., India. Mohammad Zubair Khan is currently an Associate Professor with the Department of Computer Science, Taibah University.ALTRE INFORMAZIONI
- Condizione: Nuovo
- ISBN: 9781032135274
- Collana: Computational Intelligence Techniques
- Dimensioni: 9.25 x 6.25 in Ø 0.91 lb
- Formato: Copertina rigida
- Illustration Notes: 51 b/w images, 4 tables, 11 halftones and 40 line drawings
- Pagine Arabe: 182
- Pagine Romane: xii