NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Deep learning approaches for security threats in IoT environments / (Record no. 12934)

MARC details
000 -LEADER
fixed length control field 03288nam a22005057i 4500
001 - CONTROL NUMBER
control field on1351852260
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125544.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221128s2023 nju ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DG1
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency DG1
Modifying agency OCLCO
-- OCLCL
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119884170
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119884179
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119884149
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119884144
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000073230581
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1351852260
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.8857
Item number .A255 2023eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.67/8
Edition number 22
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Abdel-Basset, Mohamed,
Dates associated with a name 1985-
Relator term author.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjFqHj8rmttYjRJRCHmrYK
245 10 - TITLE STATEMENT
Title Deep learning approaches for security threats in IoT environments /
Statement of responsibility, etc. Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"--
Assigning source Provided by publisher.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures
-- Data processing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Deep learning (Machine learning)
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet des objets
General subdivision S�ecurit�e
-- Mesures
-- Informatique.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Apprentissage profond.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Deep learning (Machine learning)
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Moustafa, Nour,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hawash, Hossam,
Relator term author.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label DEEP LEARNING APPROACHES FOR SECURITY THREATS IN IOT ENVIRONMENTS (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PD3tRWdPtPMpBHBf4M3krqP
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Abdel-Basset, Mohamed, 1985-
Title Deep learning approaches for security threats in IoT environments.
Edition First edition.
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]
International Standard Book Number 9781119884149
Record control number (DLC) 2022035671
-- (OCoLC)1345615485
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170</a>
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha