信息安全审问与膨胀的认知智能研究

Jayaganesh Jagannathan, M. Parvees
{"title":"信息安全审问与膨胀的认知智能研究","authors":"Jayaganesh Jagannathan, M. Parvees","doi":"10.22201/icat.24486736e.2022.20.5.1310","DOIUrl":null,"url":null,"abstract":"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.","PeriodicalId":15073,"journal":{"name":"Journal of Applied Research and Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey\",\"authors\":\"Jayaganesh Jagannathan, M. Parvees\",\"doi\":\"10.22201/icat.24486736e.2022.20.5.1310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.\",\"PeriodicalId\":15073,\"journal\":{\"name\":\"Journal of Applied Research and Technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Applied Research and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Research and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

信息安全是保护数据免受非法连接、泄露、复制、篡改的一套形式。最近,越来越多的合法框架,如资源丰富的城市间和城市内部、远程传感器系统、身份验证数字签名框架和监管,最近都需要数据安全确认。因此,在过去的研究中,为数据安全创建了许多以认知智能为重点的不同策略。在任何情况下,都没有对战略进行概括的完整审查。因此,本文对认知智能的研究趋向于近年来在数据安全的出版物和研讨会上发表。本文对审计各种认知智能访问和数据安全的应用进行了精确的回顾。此外,还讨论了认知智能访问和数据安全应用的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey
Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Applied Research and Technology
Journal of Applied Research and Technology 工程技术-工程:电子与电气
CiteScore
1.50
自引率
0.00%
发文量
0
审稿时长
6-12 weeks
期刊介绍: The Journal of Applied Research and Technology (JART) is a bimonthly open access journal that publishes papers on innovative applications, development of new technologies and efficient solutions in engineering, computing and scientific research. JART publishes manuscripts describing original research, with significant results based on experimental, theoretical and numerical work. The journal does not charge for submission, processing, publication of manuscripts or for color reproduction of photographs. JART classifies research into the following main fields: -Material Science: Biomaterials, carbon, ceramics, composite, metals, polymers, thin films, functional materials and semiconductors. -Computer Science: Computer graphics and visualization, programming, human-computer interaction, neural networks, image processing and software engineering. -Industrial Engineering: Operations research, systems engineering, management science, complex systems and cybernetics applications and information technologies -Electronic Engineering: Solid-state physics, radio engineering, telecommunications, control systems, signal processing, power electronics, electronic devices and circuits and automation. -Instrumentation engineering and science: Measurement devices (pressure, temperature, flow, voltage, frequency etc.), precision engineering, medical devices, instrumentation for education (devices and software), sensor technology, mechatronics and robotics.
期刊最新文献
Use of recycled concrete and rice husk ash for concrete: A review Health assessment of welding by-products in a linear welding automation: Temperature and smoke concentration measurements matlab based graphical user interface for the monitoring and early detection of keratoconus Identification of geothermal potential zone associated with land surface temperature derived from Landsat 8 data using split-window algorithm Effect of microcarbon particle size and dispersion on the electrical conductivity of LLDPE-carbon composite
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1