[go: up one dir, main page]

Xie et al., 2021 - Google Patents

Network security defence system based on artificial intelligence and big data technology

Xie et al., 2021

Document ID
9882473686060488987
Author
Xie L
Hang F
Guo W
Lv Y
Ou W
Shibly F
Publication year
Publication venue
International journal of high performance systems architecture

External Links

Snippet

Communication network security is a defence against unwanted system modifications to access files and folders within a computer network. The increasing overlap between the physical and virtual realms of improved communication poses a problem of cybersecurity. In …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0454Architectures, e.g. interconnection topology using a combination of multiple neural nets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0472Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis

Similar Documents

Publication Publication Date Title
Aminu et al. Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms
Nour et al. A survey on threat hunting in enterprise networks
Sarwar et al. IoT network anomaly detection in smart homes using machine learning
Xie et al. Network security defence system based on artificial intelligence and big data technology
Papastergiou et al. Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
Rassam et al. Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends.
Ryu et al. Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning
Mozzaquatro et al. Situation awareness in the Internet of Things
Anica-Popa et al. Addressing cybersecurity issues in ERP systems–Emerging trends
Rajasekar et al. Security analytics
Vasdev Enhancing Network Security with GeoAI and Real-Time Intrusion Detection
Krishnaveni et al. TwinSec‐IDS: An Enhanced Intrusion Detection System in SDN‐Digital‐Twin‐Based Industrial Cyber‐Physical Systems
Saied et al. Explainable artificial intelligence for botnet detection in internet of things
Kim et al. State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis
Bolatbek et al. A framework for detection and mitigation of cyber criminal activities using university networks in Kazakhstan
Seker Cyber threat intelligence understanding fundamentals
Jiang Communication network security situation analysis based on time series data mining technology
Wahab et al. The significance of artificial intelligence in cybersecurity
Baisholan et al. Corporate network anomaly detection methodology utilizing machine learning algorithms
Jeyaram et al. Exploring Cyber Threats on Data Engineering Techniques for Identifying Security Breaches
Desetty Unveiling hidden threats with ML-powered user and entity behavior analytics (UEBA)
Alguliyev et al. CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Suhaimi et al. Data Leakage Detection in Cloud Computing Environment
Arhore Intrusion detection in iot systems using machine learning