Cybersecurity in Intelligent Networking Systems / (Record no. 7124)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01654nam a22001937a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250910b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119783916 (hbk) |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | TK5105.59 |
| Item number | .X87 2023 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Xu, Shengjie (Professor) |
| 245 ## - TITLE STATEMENT | |
| Title | Cybersecurity in Intelligent Networking Systems / |
| Statement of responsibility, etc | Shengjie Xu, Yi Qian, Rose Qingyang Hu. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | This edition first published 2023. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Hoboken: |
| -- | Chichester: |
| Name of publisher, distributor, etc | John Wiley & Sons, |
| Date of publication, distribution, etc | 2023. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvi, 128 Pages; |
| Dimensions | 23 cm. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "Data-driven network intelligence is an important revolution of the intelligent networking systems. Many well-established and cutting-edge edge network communications, artificial intelligence (AI), and cyber security technologies are applied into edge network to achieve a ?smart? and efficient data communication. In recent years, intelligent networking system has attracted more and more attention from industry, research, and academia. There is a need for a comprehensive book to investigate and summarize the recent advances in AI, cyber security, and edge network communications. This book will serve the purpose to investigate technologies, applications and issues in data-driven cyber infrastructure. Data-driven Network Intelligence for Cyber Security describes data-driven network intelligence for anomaly detection and information privacy. It covers a proposed novel data-driven network intelligence system, and further presents the edge computing empowered network intelligence." |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Networks |
| General subdivision | Security Measures. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Qian, Yi, |
| Dates associated with a name | 1962- |
| Relator term | Author. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Hu, Rose Qingyang, |
| Relator term | Author. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | General Collection | Rabdan Academy | Rabdan Academy | General Stacks | 09/10/2025 | UBH | 286.00 | TK5105.59 .X87 2023 | 23522 | 09/10/2025 | C. 1 | 09/10/2025 | Books | AED 286.00 |