TY - GEN N2 - This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material. DO - 10.1007/978-3-030-89025-4 DO - doi AB - This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material. T1 - Deep learning techniques for IoT security and privacy / DA - [2022] CY - Cham : AU - Abdel-Basset, Mohamed, AU - Moustafa, Nour. AU - Hawash, Hossam. AU - Ding, Weiping. VL - v. 997 CN - Q325.5 PB - Springer, PP - Cham : PY - [2022] ID - 1443179 KW - Machine learning. KW - Internet of things KW - Apprentissage automatique. KW - Internet des objets SN - 9783030890254 SN - 3030890252 TI - Deep learning techniques for IoT security and privacy / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-89025-4 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-89025-4 ER -