語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
6G cyber security resilience = trends and challenges /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
6G cyber security resilience/ edited by H. L. Gururaj ... [et al.].
其他題名:
trends and challenges /
其他作者:
Gururaj, H. L.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
viii, 262 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Security Science and Technology. -
電子資源:
https://doi.org/10.1007/978-3-031-85008-0
ISBN:
9783031850080
6G cyber security resilience = trends and challenges /
6G cyber security resilience
trends and challenges /[electronic resource] :edited by H. L. Gururaj ... [et al.]. - Cham :Springer Nature Switzerland :2025. - viii, 262 p. :ill. (some col.), digital ;24 cm. - Advanced sciences and technologies for security applications,2363-9466. - Advanced sciences and technologies for security applications..
Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions.
This book offers a comprehensive analysis of intersection of significant domains, including information security, 6G technology, and cybersecurity. This reference work addresses gaps in existing literature by providing insights, research findings, and personal evaluations from esteemed scholars in the field. Holographic-type communications (HTC), tactile Internet, connected autonomous vehicles (CAVs), unmanned aerial vehicles (UAVs), autonomous healthcare solutions, manufacturing systems, and virtual/augmented/extended reality (VR/AR/XR), along with other cutting-edge applications, will continue to advance with the advent of 6G. The advent of the 6G era has been ushered in by the rapid advancement of communication technologies, promising unprecedented applications and connectivity. As we venture into this unexplored domain, the criticality of cybersecurity resilience cannot be overstated. This book examines and assesses the emerging trends in 6G technology, with a particular focus on the intricate challenges encountered in the realm of cybersecurity. By analyzing the intricate interplay between IoT integration, AI/ML security, quantum communication, and the intricacies of the physical layer, this book endeavors to provide a comprehensive understanding of the perpetually evolving threat landscape. It is reasonable to expect that 6G, similar to its predecessors, will promote advancements in the domain of connectivity and telecommunications through the provision of increased data throughput, decreased latency, and expanded capacity. These developments will promote the development of innovative applications and services, thus increasing the importance of robust cybersecurity protocols. As 6G technology continues to proliferate, it becomes increasingly vital to ensure the security and preservation of data. The primary audience of this book is industrialists, academicians, researchers, and UG/PG students. The secondary audience consists of practitioners, cyberpolice, lawmakers, legal firms, etc. as we are also covering regulatory and ethical considerations in 6G cybersecurity.
ISBN: 9783031850080
Standard No.: 10.1007/978-3-031-85008-0doiSubjects--Topical Terms:
783419
Security Science and Technology.
LC Class. No.: TK5103.252
Dewey Class. No.: 621.3821
6G cyber security resilience = trends and challenges /
LDR
:04296nam a2200361 a 4500
001
1161857
003
DE-He213
005
20250529130243.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031850080
$q
(electronic bk.)
020
$a
9783031850073
$q
(paper)
024
7
$a
10.1007/978-3-031-85008-0
$2
doi
035
$a
978-3-031-85008-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5103.252
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
621.3821
$2
23
090
$a
TK5103.252
$b
.A111 2025
245
0 0
$a
6G cyber security resilience
$h
[electronic resource] :
$b
trends and challenges /
$c
edited by H. L. Gururaj ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
viii, 262 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
2363-9466
505
0
$a
Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions.
520
$a
This book offers a comprehensive analysis of intersection of significant domains, including information security, 6G technology, and cybersecurity. This reference work addresses gaps in existing literature by providing insights, research findings, and personal evaluations from esteemed scholars in the field. Holographic-type communications (HTC), tactile Internet, connected autonomous vehicles (CAVs), unmanned aerial vehicles (UAVs), autonomous healthcare solutions, manufacturing systems, and virtual/augmented/extended reality (VR/AR/XR), along with other cutting-edge applications, will continue to advance with the advent of 6G. The advent of the 6G era has been ushered in by the rapid advancement of communication technologies, promising unprecedented applications and connectivity. As we venture into this unexplored domain, the criticality of cybersecurity resilience cannot be overstated. This book examines and assesses the emerging trends in 6G technology, with a particular focus on the intricate challenges encountered in the realm of cybersecurity. By analyzing the intricate interplay between IoT integration, AI/ML security, quantum communication, and the intricacies of the physical layer, this book endeavors to provide a comprehensive understanding of the perpetually evolving threat landscape. It is reasonable to expect that 6G, similar to its predecessors, will promote advancements in the domain of connectivity and telecommunications through the provision of increased data throughput, decreased latency, and expanded capacity. These developments will promote the development of innovative applications and services, thus increasing the importance of robust cybersecurity protocols. As 6G technology continues to proliferate, it becomes increasingly vital to ensure the security and preservation of data. The primary audience of this book is industrialists, academicians, researchers, and UG/PG students. The secondary audience consists of practitioners, cyberpolice, lawmakers, legal firms, etc. as we are also covering regulatory and ethical considerations in 6G cybersecurity.
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Quantum Computing.
$3
883739
650
2 4
$a
Artificial Intelligence.
$3
646849
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
6G mobile communication systems
$x
Security measures.
$3
1488784
700
1
$a
Gururaj, H. L.
$3
1488783
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Advanced sciences and technologies for security applications.
$3
1103354
856
4 0
$u
https://doi.org/10.1007/978-3-031-85008-0
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入