Library Catalog

>>
Library Catalog
>
000 nam5i
001 2210080933424
003 DE-He213
005 20250321102053
007 cr nn 008mamaa
008 231120s2024 sz | s |||| 0|eng d
020 a97830314560539978-3-031-45605-3
024 a10.1007/978-3-031-45605-32doi
040 a221008
050 aTK5105.5-5105.9
072 aUKN2bicssc
072 aCOM0430002bisacsh
072 aUKN2thema
082 a004.6223
100 aDuo, Bin.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
245 00 aSecuring Unmanned Aerial Vehicle Networksh[electronic resource] :bModels and Algorithms /cby Bin Duo, Xiaojun Yuan, Yifan Liu.
250 a1st ed. 2024.
264 aCham :bSpringer Nature Switzerland :bImprint: Springer,c2024.
300 aXIV, 123 p. 34 illus., 31 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aSpringerBriefs in Computer Science,x2191-5776
505 a1 Overview -- 2 Air-to-Ground Channel Modeling and Generalized Algorithms -- 3 Securing UAV Networks for Rural Areas -- 4 Securing UAV Networks for Urban Areas -- 5 Securing UAV Networks for Dense Urban Areas -- 6 Conclusions and Open Issues.
520 aThis book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book. .
650 aComputer networks .
650 aWireless communication systems.
650 aMobile communication systems.
650 aComputer networksxSecurity measures.
650 aTelecommunication.
650 aComputer Communication Networks.
650 aWireless and Mobile Communication.
650 aMobile and Network Security.
650 aCommunications Engineering, Networks.
700 aYuan, Xiaojun.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
700 aLiu, Yifan.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9783031456046
776 iPrinted edition:z9783031456060
830 aSpringerBriefs in Computer Science,x2191-5776
856 uhttps://doi.org/10.1007/978-3-031-45605-3
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Securing Unmanned Aerial Vehicle Networks[electronic resource] :Models and Algorithms /by Bin Duo, Xiaojun Yuan, Yifan Liu
Material type
전자책
Title
Securing Unmanned Aerial Vehicle Networks[electronic resource] :Models and Algorithms /by Bin Duo, Xiaojun Yuan, Yifan Liu
Author's Name
판 사항
1st ed. 2024.
Physical Description
XIV, 123 p 34 illus, 31 illus in color online resource.
Keyword
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book. .
관련 URL

Holdings Information

RReservation
MMissing Book Request
CClosed Stack Request
IInter-Campus Loan
CPriority Cataloging
PPrint
Registration no. Call no. Location Mark Location Status Due for return Service
전자자료는 소장사항이 존재하지 않습니다

Book Overview

Full menu