Amazon cover image
Image from Amazon.com

Deep Learning for Security and Privacy Preservation in IoT [electronic resource] /

Contributor(s): Material type: TextTextSeries: Signals and Communication TechnologyPublisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XII, 179 p. 58 illus., 44 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811661860
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Metamorphosis of Industrial IoT using Deep Leaning -- Deep Learning Models and their Architectures for Computer Vision Applications: A Review -- IoT Data Security with Machine Learning Blockchain: Risks and Countermeasures -- A Review on Cyber Crimes on the Internet of Things -- Deep learning framework for anomaly detection in IoT enabled systems -- Anomaly Detection using Unsupervised Machine Learning Algorithms -- Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT -- Deep Learning based security preservation of IoT: An industrial machine health monitoring scenario -- Deep learning Models: An Understandable Interpretable Approaches.
In: Springer Nature eBookSummary: This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Metamorphosis of Industrial IoT using Deep Leaning -- Deep Learning Models and their Architectures for Computer Vision Applications: A Review -- IoT Data Security with Machine Learning Blockchain: Risks and Countermeasures -- A Review on Cyber Crimes on the Internet of Things -- Deep learning framework for anomaly detection in IoT enabled systems -- Anomaly Detection using Unsupervised Machine Learning Algorithms -- Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT -- Deep Learning based security preservation of IoT: An industrial machine health monitoring scenario -- Deep learning Models: An Understandable Interpretable Approaches.

This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in