Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2487
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gowda, V Dankan | - |
dc.contributor.author | Puneeth Kumar, B S | - |
dc.contributor.author | Shekhar, R | - |
dc.contributor.author | Dadheech, Pankaj | - |
dc.contributor.author | Thangadurai, N | - |
dc.date.accessioned | 2023-12-18T09:45:29Z | - |
dc.date.available | 2023-12-18T09:45:29Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | pp. 112-127 | en_US |
dc.identifier.isbn | 9781668445600 | - |
dc.identifier.isbn | 9781668445587 | - |
dc.identifier.uri | https://doi.org/10.4018/978-1-6684-4558-7.ch004 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2487 | - |
dc.description.abstract | As the number of connected devices grows, the internet of things (IoT) poses new security challenges for network activity monitoring. Due to a lack of security understanding on the side of device producers and end users, the majority of internet of things devices are vulnerable. As a result, virus writers have found them to be great targets for converting them into bots and using them to perform large-scale attacks against a variety of targets. The authors provide deep learning models based on deep reinforcement learning for cyber security in IoT networks in this chapter. The IoT is a potential network that connects both living and nonliving things all around the world. As the popularity of IoT grows, cyber security remains a shortcoming, rendering it exposed to a variety of cyber-attacks. It should be emphasized, however, that while there are numerous DL algorithms presently, the scientific literature does not yet include a comprehensive catalogue of them. This chapter provides a complete list of DL algorithms as well as their many application areas. © 2022, IGI Global. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IGI Global | en_US |
dc.subject | Deep learning | en_US |
dc.subject | Cyber security | en_US |
dc.subject | IoT networks | en_US |
dc.subject | Internet of things | en_US |
dc.title | Deep Learning Models For Cyber Security In Iot Networks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Book/ Book Chapters |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.