R. Trifonov, Ognian Nakov, Georgi Tsochev, Plamen Nakov
{"title":"使用智能方法保护工业系统","authors":"R. Trifonov, Ognian Nakov, Georgi Tsochev, Plamen Nakov","doi":"10.1109/COMSCI55378.2022.9912603","DOIUrl":null,"url":null,"abstract":"New tools, programs, and security systems are constantly being developed to combat the ever-improving malicious actors. The key to understanding, analyzing the behavior and successfully countering the actions of the \"hacker\" is to know as much as possible about him and the new methods and tools he uses., so this is an area where AI can really help. This article presents an overview of intelligent methods suitable for intrusion detection in industrial systems.","PeriodicalId":399680,"journal":{"name":"2022 10th International Scientific Conference on Computer Science (COMSCI)","volume":"43 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Use of Intelligent Methods to Protect Industrial Systems\",\"authors\":\"R. Trifonov, Ognian Nakov, Georgi Tsochev, Plamen Nakov\",\"doi\":\"10.1109/COMSCI55378.2022.9912603\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"New tools, programs, and security systems are constantly being developed to combat the ever-improving malicious actors. The key to understanding, analyzing the behavior and successfully countering the actions of the \\\"hacker\\\" is to know as much as possible about him and the new methods and tools he uses., so this is an area where AI can really help. This article presents an overview of intelligent methods suitable for intrusion detection in industrial systems.\",\"PeriodicalId\":399680,\"journal\":{\"name\":\"2022 10th International Scientific Conference on Computer Science (COMSCI)\",\"volume\":\"43 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 10th International Scientific Conference on Computer Science (COMSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSCI55378.2022.9912603\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Scientific Conference on Computer Science (COMSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSCI55378.2022.9912603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Use of Intelligent Methods to Protect Industrial Systems
New tools, programs, and security systems are constantly being developed to combat the ever-improving malicious actors. The key to understanding, analyzing the behavior and successfully countering the actions of the "hacker" is to know as much as possible about him and the new methods and tools he uses., so this is an area where AI can really help. This article presents an overview of intelligent methods suitable for intrusion detection in industrial systems.