Item Infomation
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | S. Sountharrajan | - |
dc.contributor | R. Maheswar | - |
dc.contributor | Rathee, Geetanjali | - |
dc.date.accessioned | 2024-10-29T01:46:50Z | - |
dc.date.available | 2024-10-29T01:46:50Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://thuvienso.thanglong.edu.vn//handle/TLU/11580 | - |
dc.description.abstract | This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge. | vi |
dc.format.extent | 288 pages | vi |
dc.language.iso | en | vi |
dc.publisher | Wiley ; Scrivener | vi |
dc.subject | Computer security | vi |
dc.subject | Wireless communication systems | vi |
dc.subject | Hệ thống truyền thông không dây | vi |
dc.subject | Bảo mật máy tính | vi |
dc.title | Wireless communication in cyber security | vi |
dc.type | Sách/Book | vi |
Appears in Collections | Tin học |
Files in This Item: