Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2487
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGowda, V Dankan-
dc.contributor.authorPuneeth Kumar, B S-
dc.contributor.authorShekhar, R-
dc.contributor.authorDadheech, Pankaj-
dc.contributor.authorThangadurai, N-
dc.date.accessioned2023-12-18T09:45:29Z-
dc.date.available2023-12-18T09:45:29Z-
dc.date.issued2022-
dc.identifier.citationpp. 112-127en_US
dc.identifier.isbn9781668445600-
dc.identifier.isbn9781668445587-
dc.identifier.urihttps://doi.org/10.4018/978-1-6684-4558-7.ch004-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2487-
dc.description.abstractAs the number of connected devices grows, the internet of things (IoT) poses new security challenges for network activity monitoring. Due to a lack of security understanding on the side of device producers and end users, the majority of internet of things devices are vulnerable. As a result, virus writers have found them to be great targets for converting them into bots and using them to perform large-scale attacks against a variety of targets. The authors provide deep learning models based on deep reinforcement learning for cyber security in IoT networks in this chapter. The IoT is a potential network that connects both living and nonliving things all around the world. As the popularity of IoT grows, cyber security remains a shortcoming, rendering it exposed to a variety of cyber-attacks. It should be emphasized, however, that while there are numerous DL algorithms presently, the scientific literature does not yet include a comprehensive catalogue of them. This chapter provides a complete list of DL algorithms as well as their many application areas. © 2022, IGI Global. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.subjectDeep learningen_US
dc.subjectCyber securityen_US
dc.subjectIoT networksen_US
dc.subjectInternet of thingsen_US
dc.titleDeep Learning Models For Cyber Security In Iot Networksen_US
dc.typeBook chapteren_US
Appears in Collections:Book/ Book Chapters

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.