{"title":"信息安全审问与膨胀的认知智能研究","authors":"Jayaganesh Jagannathan, M. Parvees","doi":"10.22201/icat.24486736e.2022.20.5.1310","DOIUrl":null,"url":null,"abstract":"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.","PeriodicalId":15073,"journal":{"name":"Journal of Applied Research and Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey\",\"authors\":\"Jayaganesh Jagannathan, M. Parvees\",\"doi\":\"10.22201/icat.24486736e.2022.20.5.1310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.\",\"PeriodicalId\":15073,\"journal\":{\"name\":\"Journal of Applied Research and Technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Applied Research and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Research and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey
Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.
期刊介绍:
The Journal of Applied Research and Technology (JART) is a bimonthly open access journal that publishes papers on innovative applications, development of new technologies and efficient solutions in engineering, computing and scientific research. JART publishes manuscripts describing original research, with significant results based on experimental, theoretical and numerical work.
The journal does not charge for submission, processing, publication of manuscripts or for color reproduction of photographs.
JART classifies research into the following main fields:
-Material Science:
Biomaterials, carbon, ceramics, composite, metals, polymers, thin films, functional materials and semiconductors.
-Computer Science:
Computer graphics and visualization, programming, human-computer interaction, neural networks, image processing and software engineering.
-Industrial Engineering:
Operations research, systems engineering, management science, complex systems and cybernetics applications and information technologies
-Electronic Engineering:
Solid-state physics, radio engineering, telecommunications, control systems, signal processing, power electronics, electronic devices and circuits and automation.
-Instrumentation engineering and science:
Measurement devices (pressure, temperature, flow, voltage, frequency etc.), precision engineering, medical devices, instrumentation for education (devices and software), sensor technology, mechatronics and robotics.