Loupe
Search Loader

Mohamed Abdel-Basset & Nour Moustafa 
Deep Learning Approaches for Security Threats in IoT Environments 

Support
Deep Learning Approaches for Security Threats in Io T Environments

An expert discussion of the application of deep learning methods in the Io T security environment

In Deep Learning Approaches for Security Threats in Io T Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (Io T) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and Io T, and apply effective strategies to help secure and protect Io T networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation.

This book applies deep learning approaches to Io T networks and solves the security problems that professionals frequently encounter when working in the field of Io T, as well as providing ways in which smart devices can solve cybersecurity issues.

Readers will also get access to a companion website with Power Point presentations, links to supporting videos, and additional resources. They’ll also find:

* A thorough introduction to artificial intelligence and the Internet of Things, including key concepts like deep learning, security, and privacy

* Comprehensive discussions of the architectures, protocols, and standards that form the foundation of deep learning for securing modern Io T systems and networks

* In-depth examinations of the architectural design of cloud, fog, and edge computing networks

* Fulsome presentations of the security requirements, threats, and countermeasures relevant to Io T networks

Perfect for professionals working in the AI, cybersecurity, and Io T industries, Deep Learning Approaches for Security Threats in Io T Environments will also earn a place in the libraries of undergraduate and graduate students studying deep learning, cybersecurity, privacy preservation, and the security of Io T networks.
€107.99
méthodes de payement

A propos de l’auteur

Mohamed Abdel-Basset, Ph D, is an Associate Professor in the Faculty of Computers and Informatics at Zagazig University, Egypt. He is a Senior Member of the IEEE.

Nour Moustafa, Ph D, is a Postgraduate Discipline Coordinator (Cyber) and Senior Lecturer in Cybersecurity and Computing at the School of Engineering and Information Technology at the University of New South Wales, UNSW Canberra, Australia.

Hossam Hawash is an Assistant Lecturer in the Department of Computer Science, Faculty of Computers and Informatics at Zagazig University, Egypt.
Langue Anglais ● Format PDF ● Pages 384 ● ISBN 9781119884156 ● Taille du fichier 19.5 MB ● Maison d’édition John Wiley & Sons ● Publié 2022 ● Édition 1 ● Téléchargeable 24 mois ● Devise EUR ● ID 8726570 ● Protection contre la copie Adobe DRM
Nécessite un lecteur de livre électronique compatible DRM

Plus d’ebooks du même auteur(s) / Éditeur

16 155 Ebooks dans cette catégorie