|
|
|
|
LEADER |
01441nmm a2200385 u 4500 |
001 |
EB002216467 |
003 |
EBX01000000000000001353428 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
240701 ||| eng |
020 |
|
|
|a 9781040016480
|
020 |
|
|
|a 1040016480
|
020 |
|
|
|a 9781040016541
|
050 |
|
4 |
|a TK5103.25
|
245 |
0 |
0 |
|a NETWORKS ATTACK DETECTION ON 5G NETWORKS USING DATA MINING TECHNIQUES
|h [electronic resource]
|
260 |
|
|
|a [S.l.]
|b CRC PRESS
|c 2024
|
300 |
|
|
|a 1 online resource
|
653 |
|
|
|a Communications mobiles 5G / Sécurité / Mesures
|
653 |
|
|
|a Machine learning / http://id.loc.gov/authorities/subjects/sh85079324
|
653 |
|
|
|a 5G mobile communication systems / Security measures
|
653 |
|
|
|a Apprentissage automatique
|
653 |
|
|
|a Data mining / http://id.loc.gov/authorities/subjects/sh97002073
|
653 |
|
|
|a Exploration de données (Informatique)
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 1040016545
|
776 |
|
|
|z 9781040016480
|
776 |
|
|
|z 9781040016541
|
776 |
|
|
|z 9781032530185
|
776 |
|
|
|z 1032530189
|
776 |
|
|
|z 1040016480
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781040016541/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 621.38456
|
520 |
|
|
|a This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods
|