Edge Intelligence: Advanced Deep Transfer Learning for IoT Security
Editat de Jawad Ahmad, Shahid Latif, Wadii Boulila, Anis Koubaa, Mujeeb Ur Rehman, Imdad Ullah Khanen Limba Engleză Paperback – 23 ian 2026
- Examines the potential of edge computing and deep transfer learning, offering in-depth insights into how edge intelligence can be leveraged to enhance IoT and IIoT security
- Emphasizes the development of lightweight and resource-efficient models suitable for deployment on edge devices, ensuring that security measures can be effectively implemented without imposing undue computational burden or network overhead
- Presents practical examples, case studies, and implementation guidelines that demonstrate how advanced deep transfer learning techniques can be applied to address real-world security challenges in IoT and IIoT deployments
Preț: 789.52 lei
Preț vechi: 1329.30 lei
-41% Precomandă
Puncte Express: 1184
Preț estimativ în valută:
139.75€ • 163.27$ • 121.29£
139.75€ • 163.27$ • 121.29£
Carte nepublicată încă
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780443382970
ISBN-10: 0443382972
Pagini: 272
Dimensiuni: 191 x 235 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0443382972
Pagini: 272
Dimensiuni: 191 x 235 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. Introduction to IoT and IIoT Security
2. Fundamentals of Deep Learning and Transfer Learning
3. Edge Computing: Architecture and Security
4. Deep Transfer Learning for Intrusion and Anomaly Detection
5. Resource-Efficient Models for Edge Devices
6. Secure Communication and Privacy-Preserving Techniques in Edge Intelligence
7. Case Studies and Industry Applications
8. Future Trends and Emerging Technologies in IoT Security
9. Developing and Implementing a Comprehensive IoT Security Strategy
10. Conclusion
2. Fundamentals of Deep Learning and Transfer Learning
3. Edge Computing: Architecture and Security
4. Deep Transfer Learning for Intrusion and Anomaly Detection
5. Resource-Efficient Models for Edge Devices
6. Secure Communication and Privacy-Preserving Techniques in Edge Intelligence
7. Case Studies and Industry Applications
8. Future Trends and Emerging Technologies in IoT Security
9. Developing and Implementing a Comprehensive IoT Security Strategy
10. Conclusion