Deep learning approaches for security threats in IoT environments / (Record no. 40576)

000 -LEADER
fixed length control field 02769cam a22004578i 4500
001 - CONTROL NUMBER
control field 22738471
003 - CONTROL NUMBER IDENTIFIER
control field
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260216122634.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220805s2023 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022035671
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119884149
Qualifying information (hardback)
Canceled/invalid ISBN 9781119884156
Qualifying information (adobe pdf)
Canceled/invalid ISBN 9781119884163
Qualifying information (epub)
Qualifying information 1119884144
035 ## - SYSTEM CONTROL NUMBER
System control number 22738471
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.8857
Item number .A255 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678 A1354 2023
Edition number 23/eng/20220923
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Abdel-Basset, Mohamed,
Dates associated with a name 1985-
Relator term author.
245 10 - TITLE STATEMENT
Title Deep learning approaches for security threats in IoT environments /
Statement of responsibility, etc. Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt.
250 ## - EDITION STATEMENT
Edition statement First edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2211
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice c2023.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 368 pages :
Other physical details illustrations ;
Dimensions 23 cm.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- unmediated
-- n
-- rdamedia
338 ## -
-- volume
-- nc
-- rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"--
Assigning source Provided by publisher.
526 ## - STUDY PROGRAM INFORMATION NOTE
Classification Generalities
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures
-- Data processing.
Topical term or geographic name entry element Deep learning (Machine learning)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Moustafa, Nour,
Relator term author.
Personal name Hawash, Hossam,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Online version:
Main entry heading Abdel-Basset, Mohamed, 1985-.
Title Deep learning approaches for security threats in IoT environments.
Edition First edition
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]
International Standard Book Number 9781119884156
Record control number (DLC) 2022035672
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Fund Source Vendor Cost, normal purchase price Property Number Total Checkouts Full call number Barcode Date last seen Price effective from Item type
          Main-Circulation Sibalom Sibalom CCS 2025-01-17 Income POT 17998.00 2025-05-226I-11663   004.678 A1354 2023 UAMAIN 35818 2026-02-16 2026-02-16 Book