000 | 03288nam a22005057i 4500 | ||
---|---|---|---|
001 | on1351852260 | ||
003 | OCoLC | ||
005 | 20240523125544.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 221128s2023 nju ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dOCLCL |
||
020 |
_a9781119884170 _q(electronic bk.) |
||
020 |
_a1119884179 _q(electronic bk.) |
||
020 | _z9781119884149 | ||
020 | _z1119884144 | ||
029 | 1 |
_aAU@ _b000073230581 |
|
035 | _a(OCoLC)1351852260 | ||
050 | 4 |
_aTK5105.8857 _b.A255 2023eb |
|
082 | 0 | 4 |
_a004.67/8 _222 |
049 | _aMAIN | ||
100 | 1 |
_aAbdel-Basset, Mohamed, _d1985- _eauthor. _1https://id.oclc.org/worldcat/entity/E39PCjFqHj8rmttYjRJRCHmrYK |
|
245 | 1 | 0 |
_aDeep learning approaches for security threats in IoT environments / _cMohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. |
250 | _aFirst edition. | ||
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _c[2023] |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
520 |
_a"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"-- _cProvided by publisher. |
||
588 | 0 | _aPrint version record. | |
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aInternet of things _xSecurity measures _xData processing. |
|
650 | 0 | _aDeep learning (Machine learning) | |
650 | 6 |
_aInternet des objets _xS�ecurit�e _xMesures _xInformatique. |
|
650 | 6 | _aApprentissage profond. | |
650 | 7 |
_aDeep learning (Machine learning) _2fast |
|
700 | 1 |
_aMoustafa, Nour, _eauthor. |
|
700 | 1 |
_aHawash, Hossam, _eauthor. |
|
758 |
_ihas work: _aDEEP LEARNING APPROACHES FOR SECURITY THREATS IN IOT ENVIRONMENTS (Text) _1https://id.oclc.org/worldcat/entity/E39PD3tRWdPtPMpBHBf4M3krqP _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aAbdel-Basset, Mohamed, 1985- _tDeep learning approaches for security threats in IoT environments. _bFirst edition. _dHoboken, New Jersey : John Wiley & Sons, Inc., [2023] _z9781119884149 _w(DLC) 2022035671 _w(OCoLC)1345615485 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170 |
994 |
_a92 _bINLUM |
||
999 |
_c12934 _d12934 |