• Complain

Jingguo Ge - AI and Machine Learning for Network and Security Management

Here you can read online Jingguo Ge - AI and Machine Learning for Network and Security Management full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Piscataway, year: 2022, publisher: Wiley-IEEE Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    AI and Machine Learning for Network and Security Management
  • Author:
  • Publisher:
    Wiley-IEEE Press
  • Genre:
  • Year:
    2022
  • City:
    Piscataway
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

AI and Machine Learning for Network and Security Management: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "AI and Machine Learning for Network and Security Management" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT

Extensive Resource for Understanding Key Tasks of Network and Security Management

AI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.

Sample ideas covered in this thought-provoking work include:

  • How cognitive means, e.g., knowledge transfer, can help with network and security management
  • How different advanced AI and machine learning techniques can be useful and helpful to facilitate network automation
  • How the introduced techniques can be applied to many other related network and security management tasks

Network engineers, content service providers, and cybersecurity service providers can use AI and Machine Learning for Network and Security Management to make better and more informed decisions in their areas of specialization. Students in a variety of related study programs will also derive value from the work by gaining a base understanding of historical foundational knowledge and seeing the key recent developments that have been made in the field.

Jingguo Ge: author's other books


Who wrote AI and Machine Learning for Network and Security Management? Find out the surname, the name of the author of the book and a list of all author's works by series.

AI and Machine Learning for Network and Security Management — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "AI and Machine Learning for Network and Security Management" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Tables Chapter 2 Chapter 5 Chapter 6 Chapter - photo 1
Table of Contents
List of Tables
  1. Chapter 2
  2. Chapter 5
  3. Chapter 6
  4. Chapter 7
  5. Chapter 8
  6. Chapter 10
List of Illustrations
  1. Chapter 1
  2. Chapter 2
  3. Chapter 3
  4. Chapter 4
  5. Chapter 5
  6. Chapter 6
  7. Chapter 7
  8. Chapter 8
  9. Chapter 9
  10. Chapter 10
Guide
Pages
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Sarah Spurgeon, Editor in Chief
Jn Atli BenediktssonAndreas MolischDiomidis Spinellis
Anjan BoseSaeid NahavandiAhmet Murat Tekalp
Adam DrobotJeffrey Reed
Peter (Yong) LiaThomas Robertazzi
AI and Machine Learning for Network and Security Management

Yulei Wu
University of Exeter
UK

Jingguo Ge
IIE Chinese Academy of Sciences
China

Tong Li
IIE Chinese Academy of Sciences
China

Copyright 2023 by The Institute of Electrical and Electronics Engineers Inc - photo 2

Copyright 2023 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate percopy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 7508400, fax (978) 7504470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 7486011, fax (201) 7486008, or online at http://www.wiley.com/go/permission.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 7622974, outside the United States at (317) 5723993 or fax (317) 5724002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress CataloginginPublication Data applied for:
Hardback ISBN: 9781119835875

Cover Design: Wiley
Cover Image: Bill Donnelley

Author Biographies

Yulei Wu, is a Senior Lecturer with the Department of Computer Science, Faculty of Environment, Science and Economy, University of Exeter, UK. His research focuses on networking, Internet of Things, edge intelligence, information security, and ethical AI. He serves as an Associate Editor for IEEE Transactions on Network and Service Management, and IEEE Transactions on Network Science and Engineering, as well as an Editorial Board Member of Computer Networks, Future Generation Computer Systems, and Nature Scientific Reports at Nature Portfolio. He is a Senior Member of the IEEE and the ACM, and a Fellow of the HEA (Higher Education Academy).

Jingguo Ge, is currently a Professor of the Institute of Information Engineering, Chinese Academy of Sciences (CAS), and also a Professor of School of Cyber Security, University of Chinese Academy of Sciences. His research focuses on Future Network Architecture, 5G/6G, Softwaredefined networking (SDN), Cloud Native networking, Zero Trust Architecture. He has published more than 60 research papers and is the holder of 28 patents. He participated in the formulation of 3 ITU standards on IMT2020.

Tong Li, is currently a Senior Engineer of Institute of Information Engineering at the Chinese Academy of Sciences (CAS). His research and engineering focus on Computer Networks, Cloud Computing, SoftwareDefined Networking (SDN), and Distributed Network and Security Management. He participated 2 ITU standards on IMT2020 and developed many largescale software systems on SDN, network management and orchestration.

Preface

With the fast development of networking technologies, the communication network has gone through four generations and is in the process of deploying the fifthgeneration system (5G) worldwide. 5G has its unique feature of accommodating diversified services on top of a shared infrastructure. These services not only include the telecommunication service that we use every day for our daily lives, but also encompass a wide variety of services in support of many important vertical industries including energy, health, water, manufacturing, environment, to name a few. These services are mainly classified into three broad categories: enhanced Mobile Broadband ( eMBB ), Ultra Reliable Low Latency Communications ( URLLC ), and massive Machine Type Communications ( mMTC ). The deployment of 5G to support eMBB services has already started in the globe, and that of supporting URLLC and mMTC will start in the foreseeable future. Meanwhile, research of nextgeneration communication systems, i.e. beyond 5G ( B5G ) or 6G, has already started with many research centers and groups established globally.

To meet requirements of diverse services running on top of 5G/B5G/6G infrastructure, many networking and computing techniques have been incorporated into the communication system, including reconfigurable intelligent surface, Millimeterwave/THz links, highcapacity backhaul connectivity, cloud nativeness, machinetype communications, edge intelligence, blockchain, and quantum computing. This immediately results in the increasing complexity of modern networking and communication systems which will be at a scale and scope we have never seen before. This also remarkably raises the bar for network and service management. Since network security is an integral part of network management, the broad understanding of network management shall cover both network management and security management. The closedform models created for individual protocols, applications, and systems have been successful for network and security management in the past 20 years. However, the networking systems of today are too complicated for closedform analysis.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «AI and Machine Learning for Network and Security Management»

Look at similar books to AI and Machine Learning for Network and Security Management. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «AI and Machine Learning for Network and Security Management»

Discussion, reviews of the book AI and Machine Learning for Network and Security Management and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.