001557128 000__ 01577nam\\2200457M\\4500 001557128 001__ 1557128 001557128 003__ NhCcYBP 001557128 005__ 20240816003228.0 001557128 006__ m\\\\\o\\d\\\\\\\\ 001557128 007__ cr\un\nnnunnun 001557128 008__ 240411s2024\\\\xx\\\\\\o\\\\\0||\0\eng\d 001557128 020__ $$a9781040016480 001557128 020__ $$a1040016480 001557128 020__ $$a9781040016541 001557128 020__ $$a1040016545 001557128 020__ $$z1032530189 001557128 020__ $$z9781032530185 001557128 040__ $$aNhCcYBP$$cNhCcYBP 001557128 050_4 $$aTK5103.25 001557128 08204 $$a621.38456 001557128 24500 $$aNetworks attack detection on 5G networks using data mining techniques. 001557128 260__ $$a[S.l.] :$$bCRC Press,$$c2024. 001557128 300__ $$a1 online resource. 001557128 336__ $$atext$$btxt$$2rdacontent 001557128 337__ $$acomputer$$bc$$2rdamedia 001557128 338__ $$aonline resource$$bcr$$2rdacarrier 001557128 506__ $$aAccess limited to authorized users 001557128 533__ $$aElectronic reproduction.$$bAnn Arbor, MI$$nAvailable via World Wide Web. 001557128 650_0 $$a5G mobile communication systems$$xSecurity measures. 001557128 650_0 $$aData mining.$$vCongresses$$0(DLC)sh2008102035 001557128 650_0 $$aMachine learning.$$vCongresses$$0(DLC)sh2008107143 001557128 655_0 $$aElectronic books 001557128 7102_ $$aProQuest (Firm) 001557128 77608 $$iPrint version:$$z1032530189$$z9781032530185 001557128 852__ $$bebk 001557128 85640 $$3GOBI DDA$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=31247040$$zOnline Access 001557128 909CO $$ooai:library.usi.edu:1557128$$pGLOBAL_SET 001557128 980__ $$aBIB 001557128 980__ $$aEBOOK 001557128 982__ $$aEbook 001557128 983__ $$aOnline