| 000 -LEADER |
| fixed length control field |
02769cam a22004578i 4500 |
| 001 - CONTROL NUMBER |
| control field |
22738471 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
|
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260216122634.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
220805s2023 nju b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2022035671 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119884149 |
| Qualifying information |
(hardback) |
|
| Canceled/invalid ISBN |
9781119884156 |
| Qualifying information |
(adobe pdf) |
|
| Canceled/invalid ISBN |
9781119884163 |
| Qualifying information |
(epub) |
|
| Qualifying information |
1119884144 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
22738471 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5105.8857 |
| Item number |
.A255 2023 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
004.678 A1354 2023 |
| Edition number |
23/eng/20220923 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Abdel-Basset, Mohamed, |
| Dates associated with a name |
1985- |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Deep learning approaches for security threats in IoT environments / |
| Statement of responsibility, etc. |
Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
First edition. |
| 263 ## - PROJECTED PUBLICATION DATE |
| Projected publication date |
2211 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Hoboken, New Jersey : |
| Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, Inc., |
| Date of production, publication, distribution, manufacture, or copyright notice |
c2023. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 368 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
23 cm. |
| 336 ## - |
| -- |
text |
| -- |
txt |
| -- |
rdacontent |
| 337 ## - |
| -- |
unmediated |
| -- |
n |
| -- |
rdamedia |
| 338 ## - |
| -- |
volume |
| -- |
nc |
| -- |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"-- |
| Assigning source |
Provided by publisher. |
| 526 ## - STUDY PROGRAM INFORMATION NOTE |
| Classification |
Generalities |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet of things |
| General subdivision |
Security measures |
| -- |
Data processing. |
|
| Topical term or geographic name entry element |
Deep learning (Machine learning) |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Moustafa, Nour, |
| Relator term |
author. |
|
| Personal name |
Hawash, Hossam, |
| Relator term |
author. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Online version: |
| Main entry heading |
Abdel-Basset, Mohamed, 1985-. |
| Title |
Deep learning approaches for security threats in IoT environments. |
| Edition |
First edition |
| Place, publisher, and date of publication |
Hoboken, New Jersey : John Wiley & Sons, Inc., [2023] |
| International Standard Book Number |
9781119884156 |
| Record control number |
(DLC) 2022035672 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
Book |