001443179 000__ 03370cam\a2200589\a\4500 001443179 001__ 1443179 001443179 003__ OCoLC 001443179 005__ 20230310003531.0 001443179 006__ m\\\\\o\\d\\\\\\\\ 001443179 007__ cr\un\nnnunnun 001443179 008__ 211211s2022\\\\sz\\\\\\ob\\\\000\0\eng\d 001443179 019__ $$a1287956684$$a1287993986$$a1288028154$$a1288137310$$a1294349792$$a1294359267$$a1296665861 001443179 020__ $$a9783030890254$$q(electronic bk.) 001443179 020__ $$a3030890252$$q(electronic bk.) 001443179 020__ $$z3030890244 001443179 020__ $$z9783030890247 001443179 0247_ $$a10.1007/978-3-030-89025-4$$2doi 001443179 035__ $$aSP(OCoLC)1288212517 001443179 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dYDX$$dGW5XE$$dEBLCP$$dN$T$$dOCLCF$$dOCLCO$$dDCT$$dDKU$$dOCLCQ$$dOCLCO$$dOCLCQ 001443179 049__ $$aISEA 001443179 050_4 $$aQ325.5 001443179 08204 $$a006.3/1$$223 001443179 1001_ $$aAbdel-Basset, Mohamed,$$d1985- 001443179 24510 $$aDeep learning techniques for IoT security and privacy /$$cMohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding. 001443179 260__ $$aCham :$$bSpringer,$$c[2022] 001443179 300__ $$a1 online resource (273 pages) 001443179 336__ $$atext$$btxt$$2rdacontent 001443179 337__ $$acomputer$$bc$$2rdamedia 001443179 338__ $$aonline resource$$bcr$$2rdacarrier 001443179 347__ $$atext file 001443179 347__ $$bPDF 001443179 4901_ $$aStudies in Computational Intelligence ;$$vv. 997 001443179 504__ $$aIncludes bibliographical references. 001443179 5050_ $$aChapter 1, Conceptualization of Security, Forensics, and Privacy of Internet of Things -- Chapter 2, Internet of Things, Preliminaries and Foundations -- Chapter 3, Internet of Things Security Requirements, Threats, Countermeasures -- Chapter 4, Digital Forensics in Internet of Things -- Chapter 5, Supervised Deep Learning for Secure Internet of Things -- Chapter 6, Unsupervised Deep Learning for Secure Internet of Things -- Chapter 7, Semi-supervised Deep Learning for Secure Internet of Things -- Chapter 8, Reinforcement Learning for Secure Internet of Things -- Chapter 9, Federated Learning for Privacy-Preserving Internet of Things -- Chapter 10, Challenges, Opportunities, and Future Prospects. 001443179 506__ $$aAccess limited to authorized users. 001443179 520__ $$aThis book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material. 001443179 650_0 $$aMachine learning. 001443179 650_0 $$aInternet of things$$xSecurity measures. 001443179 650_6 $$aApprentissage automatique. 001443179 650_6 $$aInternet des objets$$xSécurité$$xMesures. 001443179 655_0 $$aElectronic books. 001443179 7001_ $$aMoustafa, Nour. 001443179 7001_ $$aHawash, Hossam. 001443179 7001_ $$aDing, Weiping. 001443179 77608 $$iPrint version:$$aAbdel-Basset, Mohamed.$$tDeep Learning Techniques for IoT Security and Privacy.$$dCham : Springer International Publishing AG, ©2022$$z9783030890247 001443179 830_0 $$aStudies in computational intelligence ;$$vv. 997. 001443179 852__ $$bebk 001443179 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-89025-4$$zOnline Access$$91397441.1 001443179 909CO $$ooai:library.usi.edu:1443179$$pGLOBAL_SET 001443179 980__ $$aBIB 001443179 980__ $$aEBOOK 001443179 982__ $$aEbook 001443179 983__ $$aOnline 001443179 994__ $$a92$$bISE