Results
|
601.
|
Image from Amazon.com
|
|
|
602.
|
Image from Amazon.com
|
|
|
603.
|
Image from Amazon.com
|
|
|
604.
|
Image from Amazon.com
|
|
|
605.
|
Image from Amazon.com
|
|
|
606.
|
Image from Amazon.com
|
|
|
607.
|
Image from Amazon.com
|
|
|
608.
|
Image from Amazon.com
|
|
|
609.
|
Image from Amazon.com
|
|
|
610.
|
Image from Amazon.com
|
|
|
611.
|
Image from Amazon.com
|
|
|
612.
|
Image from Amazon.com
|
|
|
613.
|
Image from Amazon.com
|
|
|
614.
|
Image from Amazon.com
|
|
|
615.
|
Image from Amazon.com
|
|
|
616.
|
Image from Amazon.com
|
|
|
617.
|
Image from Amazon.com
|
|
|
618.
|
Image from Amazon.com
|
|
|
619.
|
Image from Amazon.com
|
|
|
620.
|
Image from Amazon.com
|
Deep learning approaches for security threats in IoT environments / Mohamed Abdel-Basset, Zagazig University, Egypt, Nour Moustafa, UNSW Canberra at the Australian Defence Force Academy, Australia, Hossam Hawash, Zagazig University, Egypt. by
Edition: First edition.
Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]
Availability: No items available.
|