Computer Network Information Security Protection Measures Based on AI Intelligent Technology
Abstract
References
Index Terms
- Computer Network Information Security Protection Measures Based on AI Intelligent Technology
Recommendations
Big data algorithm for computer network information security in the 5G era
High-Performance ComputingComputers play a very important role in today’s life. A large amount of personal information exists in computers, so it is very important to protect the information security on computer networks. The development of information technology has brought a ...
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence
In the internet of things (IoT) and big data, the global information society is entering a new phase where consumers, networks, and perception devices work together more intimately. Software-defined networks (SDN) offer lower latency and massive ...
Research on the Rule of Law in Network Information Security Governance
Intelligent Computing Theories and ApplicationAbstractToday, with the continuous development of globalization, Internet technology has achieved unprecedented leap-forward development. On the one hand, data in all fields of society is growing at an explosive rate, and the development of the Internet ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 98Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format