🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

On some artificial intelligence methods and technologies for cloud-computing protection


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed.

作者简介

A. Grusho

Federal Research Center Informatics and Control

编辑信件的主要联系方式.
Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

M. Zabezhailo

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

A. Zatsarinnyi

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

V. Piskovskii

Applied Research Center for Computer Networks

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 142784

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2017