Results
|
1601.
|
Image from Amazon.com
|
|
|
1602.
|
Image from Amazon.com
|
|
|
1603.
|
Image from Amazon.com
|
|
|
1604.
|
Image from Amazon.com
|
|
|
1605.
|
Image from Amazon.com
|
|
|
1606.
|
Image from Amazon.com
|
|
|
1607.
|
Image from Amazon.com
|
|
|
1608.
|
Image from Amazon.com
|
|
|
1609.
|
Image from Amazon.com
|
|
|
1610.
|
Image from Amazon.com
|
|
|
1611.
|
Image from Amazon.com
|
|
|
1612.
|
Image from Amazon.com
|
|
|
1613.
|
Image from Amazon.com
|
|
|
1614.
|
Image from Amazon.com
|
|
|
1615.
|
Image from Amazon.com
|
|
|
1616.
|
Image from Amazon.com
|
|
|
1617.
|
Image from Amazon.com
|
|
|
1618.
|
Image from Amazon.com
|
|
|
1619.
|
Image from Amazon.com
|
|
|
1620.
|
Image from Amazon.com
|
Deep learning approaches for security threats in IoT environments / Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. by
Edition: First edition.
Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]
Availability: No items available.
|