Deep Learning Approaches for Security Threats in IoT Environments

Faculty Computer Science Year: 2022
Type of Publication: ZU Hosted Pages:
Authors:
Journal: 1st Edition Wiley-IEEE Press Volume:
Keywords : Deep Learning Approaches , Security Threats , , Environments    
Abstract:
In Deep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation. This book applies deep learning approaches to IoT networks and solves the security problems that professionals frequently encounter when working in the field of IoT, as well as providing ways in which smart devices can solve cybersecurity issues.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Saber Mohamed, "Self-adaptive Mix of Particle Swarm Methodologies for Constrained Optimization", ELSEVIER, 2014 More
  • Saber Mohamed, "Testing United Multi-Operator Evolutionary Algorithms on The CEC2014 Real-Parameter Numerical Optimization", IEEE, 2014 More
  • Saber Mohamed, "GA with a New Multi-Parent Crossover for Constrained Optimization", IEEE, 2011 More
  • Eman samir hasan sayed, "Decision Making Assessment for Site Selection Using the AHP and TOPSIS Methods", Statistical studies institution, Cairo University, Egypt, 2007 More
  • Israa Abdel Ghaffar Salem Mohammed, "Estimating Bed Requirements for a Pediatric Department in a University Hospital in Egypt", Modern Management Science & Engineering, 2016 More
Tweet