Research on Information Security Protection System of Intelligent Networked Vehicles under Computer Artificial Intelligence Technology
Abstract
References
Index Terms
- Research on Information Security Protection System of Intelligent Networked Vehicles under Computer Artificial Intelligence Technology
Recommendations
Application of artificial intelligence technology in electronic information security protection system
Creating a fully functional electronic information security protection system is extremely important for today's information security. How to improve the electronic information security protection system is an urgent problem that needs to be solved. ...
Design of network security protection network architecture for intelligent networked vehicles
CSAIDE '24: Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital EconomyThe network architecture design scheme of network security protection for intelligent connected vehicles is based on the functional performance and implementation scheme of each functional domain of the vehicle. The key controller of intelligent ...
An exploratory research on advanced smart media security design for sustainable intelligence information system
The recent issue of cyber security accident and internal information leakage accident is becoming a big obstacle in entering into sustainable intelligence information. To guarantee a sustainable smart media technology and establish an intelligence ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/60e44c6b-9b9c-46ec-b0ee-8167e8e062b8/3558819.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 64Total Downloads
- Downloads (Last 12 months)16
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format