000 02769cam a22004578i 4500
001 22738471
003
005 20260216122634.0
008 220805s2023 nju b 001 0 eng
010 _a 2022035671
020 _a9781119884149
_q(hardback)
020 _z9781119884156
_q(adobe pdf)
020 _z9781119884163
_q(epub)
020 _q1119884144
035 _a22738471
040 _aDLC
_beng
_erda
_cDLC
041 _aeng
042 _apcc
050 0 0 _aTK5105.8857
_b.A255 2023
082 0 0 _a004.678 A1354 2023
_223/eng/20220923
100 1 _aAbdel-Basset, Mohamed,
_d1985-
_eauthor.
245 1 0 _aDeep learning approaches for security threats in IoT environments /
_cMohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt.
250 _aFirst edition.
263 _a2211
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_cc2023.
300 _axvi, 368 pages :
_billustrations ;
_c23 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"--
_cProvided by publisher.
526 _a000-099
650 0 _aInternet of things
_xSecurity measures
_xData processing.
650 0 _aDeep learning (Machine learning)
700 1 _aMoustafa, Nour,
_eauthor.
700 1 _aHawash, Hossam,
_eauthor.
776 0 8 _iOnline version:
_aAbdel-Basset, Mohamed, 1985-.
_tDeep learning approaches for security threats in IoT environments.
_bFirst edition
_dHoboken, New Jersey : John Wiley & Sons, Inc., [2023]
_z9781119884156
_w(DLC) 2022035672
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cB
999 _c40576
_d40576