2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&I 2020
DOI: 10.1109/itqmis51053.2020.9322905
|View full text |Cite
|
Sign up to set email alerts
|

Legal Support of Cybersecurity in the Field of Application of Artificial Intelligence Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…• Adaptive agentsuse genetic algorithms; these are techniques that allow optimization, are useful for problemsolving, can be considered intelligent techniquesbecause they allow working simultaneously on alternative solutionsand are powerful tools when applied to solve problems. The main idea of a genetic algorithm is to mimic what nature does through its iterative process; it evolves the algorithm based on a population and defines a standard solution, adapting the solutions to existing problems [12], [14].…”
Section: Artificial Intelligencementioning
confidence: 99%
“…• Adaptive agentsuse genetic algorithms; these are techniques that allow optimization, are useful for problemsolving, can be considered intelligent techniquesbecause they allow working simultaneously on alternative solutionsand are powerful tools when applied to solve problems. The main idea of a genetic algorithm is to mimic what nature does through its iterative process; it evolves the algorithm based on a population and defines a standard solution, adapting the solutions to existing problems [12], [14].…”
Section: Artificial Intelligencementioning
confidence: 99%
“…First, it has been an attempt to regulate cyber security, namely in terms of legal support of cyber security, with regard to the application of artificial intelligence technology [61], in an innovative and economical/political-friendly way [9] and in fields such as infrastructures, by ameliorating the efficiency of technological processes in transport, reducing, for example, the inter train stops [63] and education, by improving the cyber security of university E-Gov, for example in forming a certificate database structure of university performance key indicators [21] e-learning organizations by swarm intelligence [23] and acquainting the risk a digital campus will face according to ISO series standards and criteria of risk levels [25] while suggesting relevant solutions to key issues in its network information safety [12].…”
Section: Ai Social Applicationsmentioning
confidence: 99%
“…First, it has been an attempt to regulate cyber security, namely in terms of legal support of cyber security, with regard to the application of artificial intelligence technology [61], by an innovative and economical / political friendly way [9] and in fields such as infra structures, by ameliorating the efficiency of technological processes in transport, reducing for example the inter train stops [63] and education, by improving cyber security of university E-Gov, for example in forming a certificate database structure of university Performance Key Indicators [21] e-learning organizations by swarm intelligence [23] and acquanting the risk a digital campus will face according to ISO series standards and a criteria of risk levels [25]. while suggesting relevant solutions to key issues in its network information safety [12].…”
Section: Ai Social Applicationsmentioning
confidence: 99%