<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Wireless communication security</title>
  </titleInfo>
  <titleInfo type="alternative">
    <title>Wireless communication security</title>
    <subTitle>mobile and network security protocols</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Khari, Manju</namePart>
    <role>
      <roleTerm type="text">editor.</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Bharti, Manisha</namePart>
    <role>
      <roleTerm type="text">editor.</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Niranjanamurthy, M.</namePart>
    <role>
      <roleTerm type="text">editor.</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">bibliography</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nju</placeTerm>
    </place>
    <dateIssued encoding="marc">2023</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>xv, 267 pages :  illustrations ;  24 cm. </extent>
  </physicalDescription>
  <tableOfContents>M2M in 5G cellular networks : challenges, proposed solutions, and future directions -- MAC layer protocol for wireless security -- Enhanced image security through hybrid approach: protect your copyright over digital images -- Quantum computing -- Feature engineering for flow-based IDS -- A comprehensive study of intrusion detection and prevention systems -- Hardware devices integration with IoT -- Depth analysis on DoS &amp; DDoS attacks -- SQL injection attack on database system -- Machine learning techniques for face authentication system for security purposes -- Estimation of computation time for software-defined -- Networking-based data traffic offloading system in heterogenous network. </tableOfContents>
  <note type="statement of responsibility">edited by Manju Khari, Manisha Bharti, and M. Niranjanamurthy.</note>
  <note>Includes bibliographical references and index.</note>
  <subject>
    <topic>Wireless communication systems</topic>
    <topic>Security measures</topic>
  </subject>
  <classification authority="lcc">TK5103.2</classification>
  <classification authority="ddc" edition="23">005.8 W743</classification>
  <relatedItem type="series">
    <titleInfo>
      <title>Advances in data engineering and machine learning</title>
    </titleInfo>
  </relatedItem>
  <identifier type="isbn">9781119777144</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg">CSPC</recordContentSource>
    <recordCreationDate encoding="marc">250310</recordCreationDate>
    <recordChangeDate encoding="iso8601">20250311104839.0</recordChangeDate>
    <languageOfCataloging>
      <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
    </languageOfCataloging>
  </recordInfo>
</mods>
