Intelligent Wireless Communications 2021
DOI: 10.1049/pbte094e_ch13
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence and machine learning aided blockchain systems to address security vulnerabilities and threats in the industrial Internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In order to realize the optimized, develop and design library management system [18][19][20][21][22][23][24][25], analyze with data mining technology flow characteristics of the library management, and the resource distribution characteristics of the library are analyzed in the cloud computing environment [26][27][28][29], which mainly includes the characteristics of associated knowledge base information [30], computing resources [31][32][33], physical resources and logical resources [34-38. The data flow resource distribution of library management see Figure 2.…”
Section: Analysis Of Library Information Managementmentioning
confidence: 99%
“…In order to realize the optimized, develop and design library management system [18][19][20][21][22][23][24][25], analyze with data mining technology flow characteristics of the library management, and the resource distribution characteristics of the library are analyzed in the cloud computing environment [26][27][28][29], which mainly includes the characteristics of associated knowledge base information [30], computing resources [31][32][33], physical resources and logical resources [34-38. The data flow resource distribution of library management see Figure 2.…”
Section: Analysis Of Library Information Managementmentioning
confidence: 99%
“…Although face recognition technology is in continuous development and improvement [13][14][15][16][17][18][19][20], the recognition rate, anti-counterfeiting, fingerprint, retina, and other has a large gap [21][22][23][24][25]. The large passenger flow and complex environmental characteristics of urban rail transit also affect the application of face recognition technology in urban rail transit.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lei, Y. will first introduce big data and artificial intelligence, after analyzing the application of artificial intelligence in computer networks in the current era of big data, in this way, it can be used as a reference for relevant people to communicate [13]. Xia, M. Can use the effective application of artificial intelligence virus detection and killing technology in enterprise information security situation awareness system can realize the effective identification and timely detection and killing of virus, and reduce the damage caused by virus to computer system [14][15][16][17][18].Because these studies have large loopholes, or the detection is not comprehensive enough, this paper proposes a method based on artificial intelligence on the basis of existing studies [19][20][21][22][23][24][25][26][27]. The design and deployment of the system, effective detection, threat perception, determination and threat risk tracking of information security threats can realize the comprehensive improvement of enterprises and their ability to detect security threats and security attacks [28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%