信息安全审问与膨胀的认知智能研究

Q3 Engineering
Jayaganesh Jagannathan, M. Parvees
{"title":"信息安全审问与膨胀的认知智能研究","authors":"Jayaganesh Jagannathan, M. Parvees","doi":"10.22201/icat.24486736e.2022.20.5.1310","DOIUrl":null,"url":null,"abstract":"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.","PeriodicalId":15073,"journal":{"name":"Journal of Applied Research and Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey\",\"authors\":\"Jayaganesh Jagannathan, M. Parvees\",\"doi\":\"10.22201/icat.24486736e.2022.20.5.1310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.\",\"PeriodicalId\":15073,\"journal\":{\"name\":\"Journal of Applied Research and Technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Applied Research and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Research and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22201/icat.24486736e.2022.20.5.1310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

信息安全是保护数据免受非法连接、泄露、复制、篡改的一套形式。最近,越来越多的合法框架,如资源丰富的城市间和城市内部、远程传感器系统、身份验证数字签名框架和监管,最近都需要数据安全确认。因此,在过去的研究中,为数据安全创建了许多以认知智能为重点的不同策略。在任何情况下,都没有对战略进行概括的完整审查。因此,本文对认知智能的研究趋向于近年来在数据安全的出版物和研讨会上发表。本文对审计各种认知智能访问和数据安全的应用进行了精确的回顾。此外,还讨论了认知智能访问和数据安全应用的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cognitive Intelligence for Interrogation and Inflation of Information Security: A Survey
Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. As of late, increasingly legitimate frameworks such as resourceful inter and intra urban city, remote sensor systems, authentication digital signature frameworks, and superintendence, have recently needed data security affirmations. Hence, over the past researches numerous diverse strategies focused on cognitive intelligence are created for data security. In any case, there are not complete reviews which recapitulate strategies. In this way, this document surveyed on cognitive intelligence move toward presented on publications and symposiums for data security within most recent years. This article gives a precise review to audit various cognitive intelligence access and applications of data security. In additionally, deliberate the threat of cognitive intelligence access and applications for data security is conferred.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Applied Research and Technology
Journal of Applied Research and Technology 工程技术-工程:电子与电气
CiteScore
1.50
自引率
0.00%
发文量
0
审稿时长
6-12 weeks
期刊介绍: The Journal of Applied Research and Technology (JART) is a bimonthly open access journal that publishes papers on innovative applications, development of new technologies and efficient solutions in engineering, computing and scientific research. JART publishes manuscripts describing original research, with significant results based on experimental, theoretical and numerical work. The journal does not charge for submission, processing, publication of manuscripts or for color reproduction of photographs. JART classifies research into the following main fields: -Material Science: Biomaterials, carbon, ceramics, composite, metals, polymers, thin films, functional materials and semiconductors. -Computer Science: Computer graphics and visualization, programming, human-computer interaction, neural networks, image processing and software engineering. -Industrial Engineering: Operations research, systems engineering, management science, complex systems and cybernetics applications and information technologies -Electronic Engineering: Solid-state physics, radio engineering, telecommunications, control systems, signal processing, power electronics, electronic devices and circuits and automation. -Instrumentation engineering and science: Measurement devices (pressure, temperature, flow, voltage, frequency etc.), precision engineering, medical devices, instrumentation for education (devices and software), sensor technology, mechatronics and robotics.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信