Deep learning approaches for security threats in IoT environments / (Record no. 12934)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03288nam a22005057i 4500 |
001 - CONTROL NUMBER | |
control field | on1351852260 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125544.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221128s2023 nju ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DG1 |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | DG1 |
Modifying agency | OCLCO |
-- | OCLCL |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119884170 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119884179 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119884149 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119884144 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000073230581 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1351852260 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.8857 |
Item number | .A255 2023eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.67/8 |
Edition number | 22 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Abdel-Basset, Mohamed, |
Dates associated with a name | 1985- |
Relator term | author. |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjFqHj8rmttYjRJRCHmrYK |
245 10 - TITLE STATEMENT | |
Title | Deep learning approaches for security threats in IoT environments / |
Statement of responsibility, etc. | Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Inc., |
Date of production, publication, distribution, manufacture, or copyright notice | [2023] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"-- |
Assigning source | Provided by publisher. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Print version record. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet of things |
General subdivision | Security measures |
-- | Data processing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Deep learning (Machine learning) |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet des objets |
General subdivision | S�ecurit�e |
-- | Mesures |
-- | Informatique. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Apprentissage profond. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Deep learning (Machine learning) |
Source of heading or term | fast |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Moustafa, Nour, |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hawash, Hossam, |
Relator term | author. |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | DEEP LEARNING APPROACHES FOR SECURITY THREATS IN IOT ENVIRONMENTS (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PD3tRWdPtPMpBHBf4M3krqP |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Abdel-Basset, Mohamed, 1985- |
Title | Deep learning approaches for security threats in IoT environments. |
Edition | First edition. |
Place, publisher, and date of publication | Hoboken, New Jersey : John Wiley & Sons, Inc., [2023] |
International Standard Book Number | 9781119884149 |
Record control number | (DLC) 2022035671 |
-- | (OCoLC)1345615485 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170</a> |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.