On some artificial intelligence methods and technologies for cloud-computing protection


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed.

作者简介

A. Grusho

Federal Research Center Informatics and Control

编辑信件的主要联系方式.
Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

M. Zabezhailo

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

A. Zatsarinnyi

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

V. Piskovskii

Applied Research Center for Computer Networks

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 142784

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2017