Deep learning techniques for IoT security and privacy:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2022]
|
Schriftenreihe: | Studies in computational intelligence
volume 997 |
Schlagworte: | |
Beschreibung: | xxi, 257 Seiten Illustrationen, Diagramme (farbig) |
ISBN: | 9783030890247 |
ISSN: | 1860-9503 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV047811852 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 220202s2022 a||| |||| 00||| eng d | ||
020 | |a 9783030890247 |c hbk |9 978-3-030-89024-7 | ||
035 | |a (OCoLC)1296290825 | ||
035 | |a (DE-599)BVBBV047811852 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 620.00285 |2 23 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Abdel-Basset, Mohamed |d 1985- |e Verfasser |0 (DE-588)1234920190 |4 aut | |
245 | 1 | 0 | |a Deep learning techniques for IoT security and privacy |c Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding |
264 | 1 | |a Cham |b Springer |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a xxi, 257 Seiten |b Illustrationen, Diagramme (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Studies in computational intelligence |v volume 997 |x 1860-9503 | |
650 | 4 | |a Data Engineering | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Engineering—Data processing | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Artificial intelligence | |
700 | 1 | |a Moustafa, Nour |4 aut | |
700 | 1 | |a Hawash, Hossam |4 aut | |
700 | 1 | |a Ding, Weiping |0 (DE-588)1220469874 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-89025-4 |
999 | |a oai:aleph.bib-bvb.de:BVB01-033195348 |
Datensatz im Suchindex
_version_ | 1804183348440989696 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Abdel-Basset, Mohamed 1985- Moustafa, Nour Hawash, Hossam Ding, Weiping |
author_GND | (DE-588)1234920190 (DE-588)1220469874 |
author_facet | Abdel-Basset, Mohamed 1985- Moustafa, Nour Hawash, Hossam Ding, Weiping |
author_role | aut aut aut aut |
author_sort | Abdel-Basset, Mohamed 1985- |
author_variant | m a b mab n m nm h h hh w d wd |
building | Verbundindex |
bvnumber | BV047811852 |
classification_rvk | ST 300 |
ctrlnum | (OCoLC)1296290825 (DE-599)BVBBV047811852 |
dewey-full | 620.00285 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 620 - Engineering and allied operations |
dewey-raw | 620.00285 |
dewey-search | 620.00285 |
dewey-sort | 3620.00285 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01453nam a2200421 cb4500</leader><controlfield tag="001">BV047811852</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220202s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030890247</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-030-89024-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1296290825</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047811852</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">620.00285</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Abdel-Basset, Mohamed</subfield><subfield code="d">1985-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234920190</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deep learning techniques for IoT security and privacy</subfield><subfield code="c">Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 257 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">volume 997</subfield><subfield code="x">1860-9503</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering—Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moustafa, Nour</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hawash, Hossam</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ding, Weiping</subfield><subfield code="0">(DE-588)1220469874</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-89025-4</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033195348</subfield></datafield></record></collection> |
id | DE-604.BV047811852 |
illustrated | Illustrated |
index_date | 2024-07-03T19:05:25Z |
indexdate | 2024-07-10T09:22:01Z |
institution | BVB |
isbn | 9783030890247 |
issn | 1860-9503 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033195348 |
oclc_num | 1296290825 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xxi, 257 Seiten Illustrationen, Diagramme (farbig) |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series2 | Studies in computational intelligence |
spelling | Abdel-Basset, Mohamed 1985- Verfasser (DE-588)1234920190 aut Deep learning techniques for IoT security and privacy Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding Cham Springer [2022] © 2022 xxi, 257 Seiten Illustrationen, Diagramme (farbig) txt rdacontent n rdamedia nc rdacarrier Studies in computational intelligence volume 997 1860-9503 Data Engineering Computational Intelligence Artificial Intelligence Engineering—Data processing Computational intelligence Artificial intelligence Moustafa, Nour aut Hawash, Hossam aut Ding, Weiping (DE-588)1220469874 aut Erscheint auch als Online-Ausgabe 978-3-030-89025-4 |
spellingShingle | Abdel-Basset, Mohamed 1985- Moustafa, Nour Hawash, Hossam Ding, Weiping Deep learning techniques for IoT security and privacy Data Engineering Computational Intelligence Artificial Intelligence Engineering—Data processing Computational intelligence Artificial intelligence |
title | Deep learning techniques for IoT security and privacy |
title_auth | Deep learning techniques for IoT security and privacy |
title_exact_search | Deep learning techniques for IoT security and privacy |
title_exact_search_txtP | Deep learning techniques for IoT security and privacy |
title_full | Deep learning techniques for IoT security and privacy Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding |
title_fullStr | Deep learning techniques for IoT security and privacy Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding |
title_full_unstemmed | Deep learning techniques for IoT security and privacy Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding |
title_short | Deep learning techniques for IoT security and privacy |
title_sort | deep learning techniques for iot security and privacy |
topic | Data Engineering Computational Intelligence Artificial Intelligence Engineering—Data processing Computational intelligence Artificial intelligence |
topic_facet | Data Engineering Computational Intelligence Artificial Intelligence Engineering—Data processing Computational intelligence Artificial intelligence |
work_keys_str_mv | AT abdelbassetmohamed deeplearningtechniquesforiotsecurityandprivacy AT moustafanour deeplearningtechniquesforiotsecurityandprivacy AT hawashhossam deeplearningtechniquesforiotsecurityandprivacy AT dingweiping deeplearningtechniquesforiotsecurityandprivacy |