skip to main content
10.1145/3452940.3453070acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
short-paper

Computer Network Information Security Protection Measures Based on AI Intelligent Technology

Published: 17 May 2021 Publication History

Abstract

At present, computer network is the main application object in people's work and life. Computer network in the halo of many advantages, there are still disadvantages, because the network system is vulnerable to external and internal factors, plus their own vulnerable to attack the characteristics of the network security problems appear very easy. So you need to fully know in the implementation of the elements affecting the safety of computer network, the actual situation at the same time fusion, using scientific protection scheme, raising the level of computer network security and the user's personal property security, relates to the smooth functioning of the society, adverse effects will serious losses to the state and society all benefit. This is one of the things that makes network security information so compelling. The anxiety of network users is greatly aggravated by the frequent occurrence of various network information security incidents. Study based on the nature of network information and the protection scheme, the analysis of the network information security management research focus on the distinction between the network information, importance, security crisis source, etc., aims to help the Internet police first theoretically collecting illegal crime trace and attack network crime, smooth construction of the network environment, the security of user information security and the healthy development of the virtual space.

References

[1]
Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato. Federated Learning for 6G Communications: Challenges, Methods, and Future Directions[J]. China Communications, 2020, 17(09):105--118.
[2]
Ping Zhang, Xiaodong Xu, Xiaoqi Qin, Yiming Liu, Nan Ma, Shujun Han. Evolution Toward Artificial Intelligence of Things Under 6G Ubiquitous-X[J]. Journal of Harbin Institute of Technology (New Series), 2020, 27(03):116--135.
[3]
Yuyang Bai, Yanhao HUANG, Siyuan Chen, Jun ZHANG, Baiqing LI, Feiyue Wang. Cloud Edge Intelligence: Edge Computing method for Power System Operation Control and its Application status and Prospect [J]. Journal of automation, 2020, 46(03):397--410.
[4]
Wenjun Wu, HUANG Tiejun, Gong Ke. Ethical principles of artificial intelligence in China and development of its governance technology [J]. Engineering, 2020, 6(03):212--229.
[5]
Xingyuan Chen, Yuanzhao GAO, Huilin Tang, Xuehua Du. Research progress of big data security technology. [J]. Science of China: information science, 2020, 50(01):25--66.
[6]
Linyao Yang, Siyuan Chen, Xiao WANG, Jun ZHANG, Chenghong WANG. Digital twins and parallel systems: current status, comparison and prospects [J]. Acta acta chemica sinica, 2019, 45(11):2001--2031.
[7]
Ji Zhou, Yanhong ZHOU. Bai WANG. Zang. Cun Ji. Yuan. Human-information-physical system (HCPS) for the new generation of intelligent manufacturing [J]. Engineering, 2019, 5(04):71--97.

Index Terms

  1. Computer Network Information Security Protection Measures Based on AI Intelligent Technology
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
        December 2020
        687 pages
        ISBN:9781450388665
        DOI:10.1145/3452940
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Artificial intelligence
        2. Big data
        3. Network information security

        Qualifiers

        • Short-paper
        • Research
        • Refereed limited

        Conference

        ICITEE2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 98
          Total Downloads
        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media