| 000 | 02769cam a22004578i 4500 | ||
|---|---|---|---|
| 001 | 22738471 | ||
| 003 | |||
| 005 | 20260216122634.0 | ||
| 008 | 220805s2023 nju b 001 0 eng | ||
| 010 | _a 2022035671 | ||
| 020 |
_a9781119884149 _q(hardback) |
||
| 020 |
_z9781119884156 _q(adobe pdf) |
||
| 020 |
_z9781119884163 _q(epub) |
||
| 020 | _q1119884144 | ||
| 035 | _a22738471 | ||
| 040 |
_aDLC _beng _erda _cDLC |
||
| 041 | _aeng | ||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK5105.8857 _b.A255 2023 |
| 082 | 0 | 0 |
_a004.678 A1354 2023 _223/eng/20220923 |
| 100 | 1 |
_aAbdel-Basset, Mohamed, _d1985- _eauthor. |
|
| 245 | 1 | 0 |
_aDeep learning approaches for security threats in IoT environments / _cMohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. |
| 250 | _aFirst edition. | ||
| 263 | _a2211 | ||
| 264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _cc2023. |
|
| 300 |
_axvi, 368 pages : _billustrations ; _c23 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"-- _cProvided by publisher. |
||
| 526 | _a000-099 | ||
| 650 | 0 |
_aInternet of things _xSecurity measures _xData processing. |
|
| 650 | 0 | _aDeep learning (Machine learning) | |
| 700 | 1 |
_aMoustafa, Nour, _eauthor. |
|
| 700 | 1 |
_aHawash, Hossam, _eauthor. |
|
| 776 | 0 | 8 |
_iOnline version: _aAbdel-Basset, Mohamed, 1985-. _tDeep learning approaches for security threats in IoT environments. _bFirst edition _dHoboken, New Jersey : John Wiley & Sons, Inc., [2023] _z9781119884156 _w(DLC) 2022035672 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cB |
||
| 999 |
_c40576 _d40576 |
||