Shipping Through the Holidays β˜€οΈπŸ“¦

New Year, New You Sale β˜€οΈ- Up to 20% off 500+ books!

Deep Learning Approaches for Security Threats in IoT Environments

Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
Deep Learning Approaches for Security Threats in IoT Environments delves into the evolving challenges of cybersecurity in the context of the Internet of Things (IoT). The authors explore the application of deep learning techniques to detect and mitigate threats, offering insights into how these innovative strategies can enhance security across interconnected devices. This book is aimed at researchers and professionals interested in leveraging AI to fortify IoT systems against emerging risks.
Read More
Format: Hardback
$28599
AVAILABLE WITH SUPPLIER Ships from our Auckland warehouse within 3-4 weeks

Found a better price? Request a price match

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

You might enjoy this book if you are keen on exploring how cutting-edge deep learning techniques can be applied to enhance security in the Internet of Things (IoT) environments. It offers valuable insights and practical approaches for those interested in computing, technology, and cybersecurity solutions.

Book Hero thinking about your next read

Deep Learning Approaches for Security Threats in IoT Environments

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description
Deep Learning Approaches for Security Threats in IoT Environments

An expert discussion of the application of deep learning methods in the IoT security environment.

In Deep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation.

This book applies deep learning approaches to IoT networks and solves the security problems that professionals frequently encounter when working in the field of IoT, as well as providing ways in which smart devices can solve cybersecurity issues.

Readers will also get access to a companion website with PowerPoint presentations, links to supporting videos, and additional resources. They’ll also find:

  • A thorough introduction to artificial intelligence and the Internet of Things, including key concepts like deep learning, security, and privacy.
  • Comprehensive discussions of the architectures, protocols, and standards that form the foundation of deep learning for securing modern IoT systems and networks.
  • In-depth examinations of the architectural design of cloud, fog, and edge computing networks.
  • Fulsome presentations of the security requirements, threats, and countermeasures relevant to IoT networks.

Perfect for professionals working in the AI, cybersecurity, and IoT industries, Deep Learning Approaches for Security Threats in IoT Environments will also earn a place in the libraries of undergraduate and graduate students studying deep learning, cybersecurity, privacy preservation, and the security of IoT networks.

Book Details

INFORMATION

ISBN: 9781119884149

Publisher: John Wiley & Sons Inc

Format: Hardback

Date Published: 16 November 2022

Country: United States

Imprint: Wiley-IEEE Press

Audience: Professional and scholarly

DIMENSIONS

Weight: 694g

Pages: 384

About the Author

Mohamed Abdel-Basset, PhD, is an Associate Professor in the Faculty of Computers and Informatics at Zagazig University, Egypt. He is a Senior Member of the IEEE.

Nour Moustafa, PhD, is a Postgraduate Discipline Coordinator (Cyber) and Senior Lecturer in Cybersecurity and Computing at the School of Engineering and Information Technology at the University of New South Wales, UNSW Canberra, Australia.

Hossam Hawash is an Assistant Lecturer in the Department of Computer Science, Faculty of Computers and Informatics at Zagazig University, Egypt.

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.