Normal view MARC view ISBD view

Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio / coordinated by Badr Benmammar.

Contributor(s): Benmammar, Badr.
Material type: materialTypeLabelBookPublisher: London : Hoboken : ISTE, Ltd. ; Wiley, 2021Description: 1 online resource (298 p.).ISBN: 9781119817840; 1119817846; 9781119817833; 1119817838.Subject(s): Computer networks -- Security measures | Artificial intelligence | Internet of things | Artificial intelligence | Computer networks -- Security measures | Internet of thingsGenre/Form: Electronic books.Additional physical formats: Print version:: Intelligent Network Management and ControlDDC classification: 005.8 Online resources: Wiley Online Library
Contents:
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats
1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking
2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction
3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References
4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction
    average rating: 0.0 (0 votes)
No physical items for this record

Description based upon print version of record.

Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- PART 1: AI and Network Security -- 1 Intelligent Security of Computer Networks -- 1.1. Introduction -- 1.2. AI in the service of cybersecurity -- 1.3. AI applied to intrusion detection -- 1.3.1. Techniques based on decision trees -- 1.3.2. Techniques based on data exploration -- 1.3.3. Rule-based techniques -- 1.3.4. Machine learning-based techniques -- 1.3.5. Clustering techniques -- 1.3.6. Hybrid techniques -- 1.4. AI misuse -- 1.4.1. Extension of existing threats -- 1.4.2. Introduction of new threats

1.4.3. Modification of the typical threat character -- 1.5. Conclusion -- 1.6. References -- 2 An Intelligent Control Plane for Security Services Deployment in SDN-based Networks -- 2.1. Introduction -- 2.2. Software-defined networking -- 2.2.1. General architecture -- 2.2.2. Logical distribution of SDN control -- 2.3. Security in SDN-based networks -- 2.3.1. Attack surfaces -- 2.3.2. Example of security services deployment in SDN-based networks: IPSec service -- 2.4. Intelligence in SDN-based networks -- 2.4.1. Knowledge plane -- 2.4.2. Knowledge-defined networking

2.4.3. Intelligence-defined networks -- 2.5. AI contribution to security -- 2.5.1. ML techniques -- 2.5.2. Contribution of AI to security service: intrusion detection -- 2.6. AI contribution to security in SDN-based networks -- 2.7. Deployment of an intrusion prevention service -- 2.7.1. Attack signature learning as cloud service -- 2.7.2. Deployment of an intrusion prevention service in SDN-based networks -- 2.8. Stakes -- 2.9. Conclusion -- 2.10. References -- PART 2: AI and Network Optimization -- 3 Network Optimization using Artificial Intelligence Techniques -- 3.1. Introduction

3.2. Artificial intelligence -- 3.2.1. Definition -- 3.2.2. AI techniques -- 3.3. Network optimization -- 3.3.1. AI and optimization of network performances -- 3.3.2. AI and QoS optimization -- 3.3.3. AI and security -- 3.3.4. AI and energy consumption -- 3.4. Network application of AI -- 3.4.1. ESs and networks -- 3.4.2. CBR and telecommunications networks -- 3.4.3. Automated learning and telecommunications networks -- 3.4.4. Big data and telecommunications networks -- 3.4.5. MASs and telecommunications networks -- 3.4.6. IoT and networks -- 3.5. Conclusion -- 3.6. References

4 Multicriteria Optimization Methods for Network Selection in a Heterogeneous Environment -- 4.1. Introduction -- 4.2. Multicriteria optimization and network selection -- 4.2.1. Network selection process -- 4.2.2. Multicriteria optimization methods for network selection -- 4.3. "Modified-SAW" for network selection in a heterogeneous environment -- 4.3.1. "Modified-SAW" proposed method -- 4.3.2. Performance evaluation -- 4.4. Conclusion -- 4.5. References -- PART 3: AI and the Cloud Approach -- 5 Selection of Cloud Computing Services: Contribution of Intelligent Methods -- 5.1. Introduction

5.2. Scientific and technical prerequisites.

Includes bibliographical references and index.

Wiley Frontlist Obook All English 2021

There are no comments for this item.

Log in to your account to post a comment.