0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Responsible Graph Neural Networks (Hardcover): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Hardcover)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R2,633 Discovery Miles 26 330 Ships in 12 - 17 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

Responsible Graph Neural Networks (Paperback): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Paperback)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R1,530 Discovery Miles 15 300 Ships in 12 - 17 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

Deep Learning Techniques for IoT Security and Privacy (Hardcover, 1st ed. 2022): Mohamed Abdel-Basset, Nour Moustafa, Hossam... Deep Learning Techniques for IoT Security and Privacy (Hardcover, 1st ed. 2022)
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding
R4,677 Discovery Miles 46 770 Ships in 12 - 17 working days

This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material.

Deep Learning Techniques for IoT Security and Privacy (Paperback, 1st ed. 2022): Mohamed Abdel-Basset, Nour Moustafa, Hossam... Deep Learning Techniques for IoT Security and Privacy (Paperback, 1st ed. 2022)
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding
R4,827 Discovery Miles 48 270 Ships in 10 - 15 working days

This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
For the Grandfather Who Has Everything…
Team Golfwell, Bruce Miller Hardcover R556 Discovery Miles 5 560
Interdisciplinarity
John Aldrich Hardcover R4,171 Discovery Miles 41 710
The Ickabog
J. K. Rowling Hardcover R713 R643 Discovery Miles 6 430
Sustaining Higher Education Through…
Manyane Makua, Mariam Akinlolu Hardcover R6,076 Discovery Miles 60 760
Into The Uncut Grass
Trevor Noah Hardcover  (1)
R399 R362 Discovery Miles 3 620
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R317 Discovery Miles 3 170
Rice Biology in the Genomics Era
Hiroyuki Hirano, Atshushi Hirai, … Hardcover R5,932 Discovery Miles 59 320
Winx Do Simple Wireless Mouse
R269 R247 Discovery Miles 2 470
Instant Insights: Improving Water…
Amir Haghverdi, Brian G. Leib, … Paperback R1,343 Discovery Miles 13 430
Cook, Eat, Repeat - Ingredients, Recipes…
Nigella Lawson Hardcover R852 R735 Discovery Miles 7 350

 

Partners