Deep learning approaches for security threats in IoT environments /

"Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupe...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdel-Basset, Mohamed, 1985- (Author)
Group Author: Moustafa, Nour; Hawash, Hossam
Published: John Wiley & Sons, Inc.,
Publisher Address: Hoboken, New Jersey :
Publication Dates: [2023]
Literature type: Book
Language: English
Subjects:
Summary: "Deep Learning Approaches for Security Threats in IoT Environments discusses approaches and measures to ensure our IoT systems are secure. This book discusses important concepts of AI and IoT and applies vital approaches that can be used to protect our systems - these include supervised, unsupervised, and semi-supervised Deep Learning approaches as well as Reinforcement and Federated Learning for privacy-preserving. This book applies Digital Forensics to IoT and discusses problems that professionals may encounter when working in the field of IoT forensics, providing ways in which smart devices can solve cyber security issues. Aimed at readers within the cyber security field, this book presents the most recent challenges that are faced in deep learning when creating a secure platform for IoT systems and addresses the possible solutions, paving the way for a more secure future"--
Carrier Form: xvi, 368 pages : illustrations, forms ; 23 cm
Bibliography: Includes bibliographical references and index.
ISBN: 9781119884149
1119884144
Index Number: TK5105
CLC: TP181
TP393.08-37
Call Number: TP393.08-37/A135