Xu, 2023 - Google Patents
Research and application of network security detection technology based on computer visionXu, 2023
- Document ID
- 16966498880102460621
- Author
- Xu J
- Publication year
- Publication venue
- Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023)
External Links
Snippet
With the development of the Internet and the advent of the digital era, the Internet has become an indispensable part of people's daily lives. However, along with the development of the network, there are more and more cyber-attacks, which not only pose a threat to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almaiah et al. | Classification of cyber security threats on mobile devices and applications | |
Sudhakar et al. | An emerging threat Fileless malware: a survey and research challenges | |
Sadqi et al. | A systematic review and taxonomy of web applications threats | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Mathane et al. | Predictive analysis of ransomware attacks using context-aware AI in IoT systems | |
Vignesh Saravanan et al. | Data protection and security enhancement in cyber-physical systems using AI and blockchain | |
Nayak et al. | Data storage and transmission security in the cloud: The artificial intelligence (AI) edge | |
Bhardwaj et al. | Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics | |
Mohd Saudi et al. | iOS mobile malware analysis: a state-of-the-art | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Gangwani et al. | A comprehensive review on cloud security using machine learning techniques | |
Georgina et al. | Deception based techniques against ransomwares: A systematic review | |
Uyyala | Multilevel authentication system using hierarchical intrusion detection architecture for online banking | |
Jiang | Communication network security situation analysis based on time series data mining technology | |
Okolo | A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices | |
Dahiya | Malware detection in IoT | |
Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
Xu | Research and application of network security detection technology based on computer vision | |
Frade et al. | DBD-Guardian and Privacy-Aware Near Real-Time Cybersecurity Analytics | |
Ahmad et al. | Big Data and Its Role in Cybersecurity | |
Cai et al. | Medical big data intrusion detection system based on virtual data analysis from assurance perspective | |
Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
Möller | Introduction to Cybersecurity | |
Kolokotronis et al. | Cyber-trust: The shield for IoT cyber-attacks | |
Amanuel et al. | A Review of the Various Machine Learning Algorithms for Cloud Computing |