Mohamed Abdel-Basset & Nour Moustafa 
Deep Learning Approaches for Security Threats in IoT Environments [PDF ebook] 

الدعم

Deep Learning Approaches for Security Threats in Io T Environments
An expert discussion of the application of deep learning methods in the Io T security environment
In Deep Learning Approaches for Security Threats in Io T Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (Io T) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and Io T, and apply effective strategies to help secure and protect Io T networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation.
This book applies deep learning approaches to Io T networks and solves the security problems that professionals frequently encounter when working in the field of Io T, as well as providing ways in which smart devices can solve cybersecurity issues.
Readers will also get access to a companion website with Power Point presentations, links to supporting videos, and additional resources. They’ll also find:
* A thorough introduction to artificial intelligence and the Internet of Things, including key concepts like deep learning, security, and privacy
* Comprehensive discussions of the architectures, protocols, and standards that form the foundation of deep learning for securing modern Io T systems and networks
* In-depth examinations of the architectural design of cloud, fog, and edge computing networks
* Fulsome presentations of the security requirements, threats, and countermeasures relevant to Io T networks
Perfect for professionals working in the AI, cybersecurity, and Io T industries, Deep Learning Approaches for Security Threats in Io T Environments will also earn a place in the libraries of undergraduate and graduate students studying deep learning, cybersecurity, privacy preservation, and the security of Io T networks.

€107.99
طرق الدفع

عن المؤلف

Mohamed Abdel-Basset, Ph D, is an Associate Professor in the Faculty of Computers and Informatics at Zagazig University, Egypt. He is a Senior Member of the IEEE.
Nour Moustafa, Ph D, is a Postgraduate Discipline Coordinator (Cyber) and Senior Lecturer in Cybersecurity and Computing at the School of Engineering and Information Technology at the University of New South Wales, UNSW Canberra, Australia.
Hossam Hawash is an Assistant Lecturer in the Department of Computer Science, Faculty of Computers and Informatics at Zagazig University, Egypt.

قم بشراء هذا الكتاب الإلكتروني واحصل على كتاب آخر مجانًا!
لغة الإنجليزية ● شكل PDF ● صفحات 384 ● ISBN 9781119884156 ● حجم الملف 19.5 MB ● الناشر John Wiley & Sons ● نشرت 2022 ● الإصدار 1 ● للتحميل 24 الشهور ● دقة EUR ● هوية شخصية 8726570 ● حماية النسخ Adobe DRM
يتطلب قارئ الكتاب الاليكتروني قادرة DRM

المزيد من الكتب الإلكترونية من نفس المؤلف (المؤلفين) / محرر

16٬501 كتب إلكترونية في هذه الفئة