Xie et al., 2021 - Google Patents
Network security defence system based on artificial intelligence and big data technologyXie et al., 2021
- Document ID
- 9882473686060488987
- Author
- Xie L
- Hang F
- Guo W
- Lv Y
- Ou W
- Shibly F
- Publication year
- Publication venue
- International journal of high performance systems architecture
External Links
Snippet
Communication network security is a defence against unwanted system modifications to access files and folders within a computer network. The increasing overlap between the physical and virtual realms of improved communication poses a problem of cybersecurity. In …
- 238000005516 engineering process 0 title description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/0454—Architectures, e.g. interconnection topology using a combination of multiple neural nets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/0472—Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99936—Pattern matching access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aminu et al. | Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms | |
Nour et al. | A survey on threat hunting in enterprise networks | |
Sarwar et al. | IoT network anomaly detection in smart homes using machine learning | |
Xie et al. | Network security defence system based on artificial intelligence and big data technology | |
Papastergiou et al. | Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures | |
Rassam et al. | Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends. | |
Ryu et al. | Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning | |
Mozzaquatro et al. | Situation awareness in the Internet of Things | |
Anica-Popa et al. | Addressing cybersecurity issues in ERP systems–Emerging trends | |
Rajasekar et al. | Security analytics | |
Vasdev | Enhancing Network Security with GeoAI and Real-Time Intrusion Detection | |
Krishnaveni et al. | TwinSec‐IDS: An Enhanced Intrusion Detection System in SDN‐Digital‐Twin‐Based Industrial Cyber‐Physical Systems | |
Saied et al. | Explainable artificial intelligence for botnet detection in internet of things | |
Kim et al. | State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis | |
Bolatbek et al. | A framework for detection and mitigation of cyber criminal activities using university networks in Kazakhstan | |
Seker | Cyber threat intelligence understanding fundamentals | |
Jiang | Communication network security situation analysis based on time series data mining technology | |
Wahab et al. | The significance of artificial intelligence in cybersecurity | |
Baisholan et al. | Corporate network anomaly detection methodology utilizing machine learning algorithms | |
Jeyaram et al. | Exploring Cyber Threats on Data Engineering Techniques for Identifying Security Breaches | |
Desetty | Unveiling hidden threats with ML-powered user and entity behavior analytics (UEBA) | |
Alguliyev et al. | CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience | |
Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
Suhaimi et al. | Data Leakage Detection in Cloud Computing Environment | |
Arhore | Intrusion detection in iot systems using machine learning |