LEADER 01409nam 2200469 450 001 9910466348103321 005 20200121155833.0 010 $a2-335-16764-2 035 $a(CKB)3710000000853632 035 $a(EBL)4678933 035 $a(MiAaPQ)EBC4678933 035 $a(Au-PeEL)EBL4678933 035 $a(CaPaEBR)ebr11265615 035 $a(OCoLC)958077991 035 $a(EXLCZ)993710000000853632 100 $a20200121d2015 uy 0 101 0 $afre 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPour se de?fendre sans armes /$fSalmson-Creak 210 1$a[Place of publication not identified] :$cE?ditions Ligaran,$d[2015] 210 4$dİ2015 215 $a1 online resource (76 p.) 225 0 $aLivre nume?rique 300 $aDescription based upon print version of record. 327 $aPage de titre; I; II; III; IV; V; VI; VII; VIII; IX; X; XI; XII; XIII; XIV; Page de Copyright 606 $aSelf-defense 606 $aHand-to-hand fighting 608 $aElectronic books. 615 0$aSelf-defense. 615 0$aHand-to-hand fighting. 676 $a613.66 700 $aSalmson-Creak$0858424 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910466348103321 996 $aPour se de?fendre sans armes$92175968 997 $aUNINA LEADER 05571nam 22006735 450 001 9911007469103321 005 20250529130243.0 010 $a3-031-85008-4 024 7 $a10.1007/978-3-031-85008-0 035 $a(CKB)39124575700041 035 $a(DE-He213)978-3-031-85008-0 035 $a(MiAaPQ)EBC32140559 035 $a(Au-PeEL)EBL32140559 035 $a(OCoLC)1524426006 035 $a(EXLCZ)9939124575700041 100 $a20250529d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a6G Cyber Security Resilience: Trends and Challenges /$fedited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (VIII, 262 p. 60 illus., 54 illus. in color.) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$a3-031-85007-6 327 $aAnalysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions. 330 $aThis book offers a comprehensive analysis of intersection of significant domains, including information security, 6G technology, and cybersecurity. This reference work addresses gaps in existing literature by providing insights, research findings, and personal evaluations from esteemed scholars in the field. Holographic-type communications (HTC), tactile Internet, connected autonomous vehicles (CAVs), unmanned aerial vehicles (UAVs), autonomous healthcare solutions, manufacturing systems, and virtual/augmented/extended reality (VR/AR/XR), along with other cutting-edge applications, will continue to advance with the advent of 6G. The advent of the 6G era has been ushered in by the rapid advancement of communication technologies, promising unprecedented applications and connectivity. As we venture into this unexplored domain, the criticality of cybersecurity resilience cannot be overstated. This book examines and assesses the emerging trends in 6G technology, with a particular focus on the intricate challenges encountered in the realm of cybersecurity. By analyzing the intricate interplay between IoT integration, AI/ML security, quantum communication, and the intricacies of the physical layer, this book endeavors to provide a comprehensive understanding of the perpetually evolving threat landscape. It is reasonable to expect that 6G, similar to its predecessors, will promote advancements in the domain of connectivity and telecommunications through the provision of increased data throughput, decreased latency, and expanded capacity. These developments will promote the development of innovative applications and services, thus increasing the importance of robust cybersecurity protocols. As 6G technology continues to proliferate, it becomes increasingly vital to ensure the security and preservation of data. The primary audience of this book is industrialists, academicians, researchers, and UG/PG students. The secondary audience consists of practitioners, cyberpolice, lawmakers, legal firms, etc. as we are also covering regulatory and ethical considerations in 6G cybersecurity. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aData protection 606 $aArtificial intelligence 606 $aQuantum computers 606 $aSecurity systems 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aQuantum Computing 606 $aSecurity Science and Technology 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aQuantum computers. 615 0$aSecurity systems. 615 14$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aQuantum Computing. 615 24$aSecurity Science and Technology. 676 $a005.8 702 $aGururaj$b H. L$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRavi$b VinayaKumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShreyas$b J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPavithra$b N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSapana?$b A?ra.$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007469103321 996 $a6G Cyber Security Resilience: Trends and Challenges$94393362 997 $aUNINA