Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Deep Learning Approaches for Security Threats in IoT EnvironmentsDeep Learning Approaches for Security Threats in IoT Environments

Deep Learning Approaches for Security Threats in IoT Environments

Hossam Reda Mohamed Hawash, Mohamed Abdel-basset Metwalli Atia, Nour Moustafa

Details

OL Work ID
OL26765371W

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.