M. Iavich, G. Iashvili, A. Gagnidze, R. Odarchenko
{"title":"内容过滤方法在硬件漏洞识别系统中的应用","authors":"M. Iavich, G. Iashvili, A. Gagnidze, R. Odarchenko","doi":"10.1109/aict52120.2021.9628948","DOIUrl":null,"url":null,"abstract":"Content filtering tools are fairly well established today. They allow us to find content that is relevant to our needs and interests. Many web platforms such as travel databases, online shops, educational systems and others use recommender tools to filter the content. For these systems, the issue of user security is quite acute on the agenda as hardware based systems are very often attacked by hackers. Many efficient results can be achieved by incorporating machine learning mechanisms into the recommendation systems. This will notably increase hardware-based systems security level. Information retrieval systems that rely on content-based mechanisms provide users with the relevant information and at the same time analyze their behavior. This is done to Figure out how effective the search was for the user. A model of a content-based recommendation system can be incorporated into existing security mechanisms. The network system developed in our study uses the integrated filtering mechanism to identify the frequency of the term received from the user input and it delivers the relevant content to the end user. This system has the advantage of the interacting with specific user cases. It should be noted that the content-based systems may not be fully functional by taking more complex interactions and user actions. This fact is the important field of the research in the world.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Use of Content-Filtering Method for Hardware Vulnerabilities Identification System\",\"authors\":\"M. Iavich, G. Iashvili, A. Gagnidze, R. Odarchenko\",\"doi\":\"10.1109/aict52120.2021.9628948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Content filtering tools are fairly well established today. They allow us to find content that is relevant to our needs and interests. Many web platforms such as travel databases, online shops, educational systems and others use recommender tools to filter the content. For these systems, the issue of user security is quite acute on the agenda as hardware based systems are very often attacked by hackers. Many efficient results can be achieved by incorporating machine learning mechanisms into the recommendation systems. This will notably increase hardware-based systems security level. Information retrieval systems that rely on content-based mechanisms provide users with the relevant information and at the same time analyze their behavior. This is done to Figure out how effective the search was for the user. A model of a content-based recommendation system can be incorporated into existing security mechanisms. The network system developed in our study uses the integrated filtering mechanism to identify the frequency of the term received from the user input and it delivers the relevant content to the end user. This system has the advantage of the interacting with specific user cases. It should be noted that the content-based systems may not be fully functional by taking more complex interactions and user actions. This fact is the important field of the research in the world.\",\"PeriodicalId\":375013,\"journal\":{\"name\":\"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/aict52120.2021.9628948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aict52120.2021.9628948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Use of Content-Filtering Method for Hardware Vulnerabilities Identification System
Content filtering tools are fairly well established today. They allow us to find content that is relevant to our needs and interests. Many web platforms such as travel databases, online shops, educational systems and others use recommender tools to filter the content. For these systems, the issue of user security is quite acute on the agenda as hardware based systems are very often attacked by hackers. Many efficient results can be achieved by incorporating machine learning mechanisms into the recommendation systems. This will notably increase hardware-based systems security level. Information retrieval systems that rely on content-based mechanisms provide users with the relevant information and at the same time analyze their behavior. This is done to Figure out how effective the search was for the user. A model of a content-based recommendation system can be incorporated into existing security mechanisms. The network system developed in our study uses the integrated filtering mechanism to identify the frequency of the term received from the user input and it delivers the relevant content to the end user. This system has the advantage of the interacting with specific user cases. It should be noted that the content-based systems may not be fully functional by taking more complex interactions and user actions. This fact is the important field of the research in the world.