Deep learning approaches for security threats in IoT environments /

"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupe...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdel-Basset, Mohamed, 1985- (Author), Moustafa, Nour (Author), Hawash, Hossam (Author)
Format: Electronic eBook
Language:English
Published: Piscataway, NJ : Hoboken, New Jersey : IEEE Press ; John Wiley & Sons, Inc, [2023]
Subjects:
Online Access:CONNECT

MARC

LEADER 00000nam a2200000 i 4500
001 in00006303895
006 m o d
007 cr |||||||||||
008 220805s2023 njua ob 001 0 eng
005 20240124155108.4
010 |a  2022035672 
020 |a 9781119884170 
020 |a 9781119884163  |q electronic publication 
020 |a 1119884160  |q electronic publication 
020 |a 9781119884156  |q electronic book 
020 |a 1119884152  |q electronic book 
020 |a 1119884179  |q electronic book 
020 |z 9781119884149  |q hardcover 
024 7 |a 10.1002/9781119884170  |2 doi 
035 |a (NhCcYBP)e80fa363d91f485b9a695405a0a7a4bb9781119884170 
035 |a 1wileyeba9781119884170 
037 |a 9965964  |b IEEE 
040 |a DLC  |b eng  |e rda  |c DLC 
042 |a pcc 
050 0 4 |a TK5105.8857  |b .A23 2023 
082 0 0 |a 004.67/8  |2 23/eng/20220923 
100 1 |a Abdel-Basset, Mohamed,  |d 1985-  |e author. 
245 1 0 |a Deep learning approaches for security threats in IoT environments /  |c Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. 
264 1 |a Piscataway, NJ :  |b IEEE Press ;  |a Hoboken, New Jersey :  |b John Wiley & Sons, Inc,  |c [2023] 
300 |a 1 online resource :  |b illustrations (chiefly color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Wiley EBA  |5 TMurS 
504 |a Includes bibliographical references and index. 
520 |a "Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on December 02, 2022). 
650 0 |a Internet of things  |x Security measures  |x Data processing. 
650 0 |a Deep learning (Machine learning) 
700 1 |a Moustafa, Nour,  |e author. 
700 1 |a Hawash, Hossam,  |e author. 
730 0 |a WILEYEBA 
776 0 8 |i Print version:  |a Abdel-Basset, Mohamed, 1985-  |t Deep learning approaches for security threats in IoT environments  |b First edition.  |d Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]  |z 9781119884149  |w (DLC) 2022035671 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781119884170  |z CONNECT  |3 Wiley  |t 0 
949 |a ho0 
975 |p Wiley UBCM Online Book All Titles thru 2023 
976 |a 6006612 
998 |a wi  |d z 
999 f f |s 5423c768-a11a-43b7-a6e8-bee0063bb4e6  |i 406674e9-2050-431a-89d2-7d08cad47e2a  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5105.8857 .A23 2023  |h Library of Congress classification