Edge Intelligence: Advanced Deep Transfer Learning for IoT Security
Editat de Jawad Ahmad, Shahid Latif, Wadii Boulila, Anis Koubaa, Mujeeb Ur Rehman, Imdad Ullah Khanen Limba Engleză Paperback – 23 ian 2026
- Examines the potential of edge computing and deep transfer learning, offering in-depth insights into how edge intelligence can be leveraged to enhance IoT and IIoT security
- Emphasizes the development of lightweight and resource-efficient models suitable for deployment on edge devices, ensuring that security measures can be effectively implemented without imposing undue computational burden or network overhead
- Presents practical examples, case studies, and implementation guidelines that demonstrate how advanced deep transfer learning techniques can be applied to address real-world security challenges in IoT and IIoT deployments
Preț: 792.13 lei
Preț vechi: 990.16 lei
-20% Precomandă
Puncte Express: 1188
Preț estimativ în valută:
140.17€ • 164.37$ • 123.10£
140.17€ • 164.37$ • 123.10£
Carte nepublicată încă
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780443382970
ISBN-10: 0443382972
Pagini: 272
Dimensiuni: 191 x 235 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0443382972
Pagini: 272
Dimensiuni: 191 x 235 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. Introduction to IoT and IIoT Security
2. Fundamentals of Deep Learning and Transfer Learning
3. Edge Computing: Architecture and Security
4. Deep Transfer Learning for Intrusion and Anomaly Detection
5. Resource-Efficient Models for Edge Devices
6. Secure Communication and Privacy-Preserving Techniques in Edge Intelligence
7. Case Studies and Industry Applications
8. Future Trends and Emerging Technologies in IoT Security
9. Developing and Implementing a Comprehensive IoT Security Strategy
10. Conclusion
2. Fundamentals of Deep Learning and Transfer Learning
3. Edge Computing: Architecture and Security
4. Deep Transfer Learning for Intrusion and Anomaly Detection
5. Resource-Efficient Models for Edge Devices
6. Secure Communication and Privacy-Preserving Techniques in Edge Intelligence
7. Case Studies and Industry Applications
8. Future Trends and Emerging Technologies in IoT Security
9. Developing and Implementing a Comprehensive IoT Security Strategy
10. Conclusion