CN112488300A - Information system safety protection method based on bionic control mechanism - Google Patents

Information system safety protection method based on bionic control mechanism Download PDF

Info

Publication number
CN112488300A
CN112488300A CN202011413094.7A CN202011413094A CN112488300A CN 112488300 A CN112488300 A CN 112488300A CN 202011413094 A CN202011413094 A CN 202011413094A CN 112488300 A CN112488300 A CN 112488300A
Authority
CN
China
Prior art keywords
task
execution
information system
module
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011413094.7A
Other languages
Chinese (zh)
Other versions
CN112488300B (en
Inventor
李涛
胡旭
李鹏
江致文
翟雨佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN202011413094.7A priority Critical patent/CN112488300B/en
Publication of CN112488300A publication Critical patent/CN112488300A/en
Application granted granted Critical
Publication of CN112488300B publication Critical patent/CN112488300B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/061Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using biological neurons, e.g. biological neurons connected to an integrated circuit
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to an information system safety protection method based on a bionic control mechanism, which comprises the following steps: simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner; step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed; and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy. According to the technical scheme, elements of neurons, spinal nerves and human brain are introduced into each layer of an information system network, so that a safety system and system functions are highly integrated, and fine-grained safety control is performed by taking tasks as guidance on the basis of functional element modularization of the system.

Description

Information system safety protection method based on bionic control mechanism
Technical Field
The invention relates to the fields of information security technology, bionic control and active security defense, in particular to an information system security protection method based on a bionic control mechanism.
Background
With the increasingly complex architecture of the information system, the data volume of the load is exponentially increased, the data source is richer, the content is more diversified, and the dimensionality is wider. Meanwhile, with the gradual improvement of the performance of the terminal equipment, the sending rate of the data source is higher, which also leads to higher requirements on the acquisition speed of the security parameters. In the face of information networks of heavy traffic communication services, "shell defense" has no time to do depth filtering and intrusion detection. The existing security strategy of 'firstly establishing a network and then protecting' cannot cope with relevant scenes; the centralized defense mode can also reduce the external service capability of the information system to a certain extent; the weak security association between the defense mechanism and the information system also results in reduced defense effectiveness. In the practical application process of the existing methods or models such as computer immunization, trusted computing and the like, the unification of the system operation efficiency and the safety protection is difficult to achieve due to the lack of high fusion with the original information system.
In recent years, the concept of intrinsic security can solve the fusion problem, process high-rate data and cope with unknown threats, and is an active defense method. However, the existing endogenous safety protection method is not defined clearly, the biological safety protection mechanism is used for reference, and the active defense based on the bionic control is few in related researches, so that the patent provides an information system safety protection method based on the bionic control mechanism, and the method has great significance for the active defense in the dynamic operation environment so as to enable the task to be completed as expected by using the defense mechanism of human body facing internal and external safety threats.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an information system safety protection method based on a bionic control mechanism, and the technical scheme leads elements of neurons, spinal nerves and human brain to each layer of an information system network, so that the safety system and the system function are highly integrated. On the basis of modularization of functional elements of the system, fine-grained safety control is conducted by taking a task as guidance. The method can more effectively realize the dynamic and active maintenance of the security of the information system.
In order to achieve the above object, the technical solution of the present invention is as follows, a method for information system security protection based on a bionic control mechanism, the method comprising the steps of:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy.
As an improvement of the present invention, the step (1) "simulating a high-efficiency neural control mechanism of a human body and constructing a neural system control architecture" means simulating a main composition of a neural control system and an internal feedback principle to form a set of neural control flow of an information system, and the neural system hierarchical architecture is roughly divided into neurons, spinal nerves and a brain, and a system architecture penetrating through an information system terminal, a network layer and a core network layer is constructed.
As an improvement of the invention, the layering method in the step (1) comprises the following steps: (1.1) the terminal is mainly responsible for perception, feedback and calibration, it contains a large amount of safe neurons, through the activity of neuron perception and control every terminal system, monitor and maintain the normal operation of application task, the composition module of various applications of terminal operation is effect part, the neuron extends to every effect part, in order to reduce the terminal burden simultaneously, the neuron only carries out the low-power consumption operation such as strategy assignment, environmental perception, action calibration function, do not do large-scale operation, the terminal application is carried out with the mode of task, call corresponding module and carry out task according to the tactics stipulated in advance, perceive various operational parameters and feed back it to the spinal nerve in the implementation, if the deviation appears, the terminal neuron then commands the effector to calibrate according to the calibration strategy, if: replacement of modules, reduction of load, etc.; (1.2) the network layer contains end nodes with interactive requirements at higher layers, these nodes: sharing a large amount of resources, communicating the resources through a local or wide area network, supporting the same organization network, coordinating the work of terminal neurons by using network layer spinal nerves and transmitting information between a terminal and a brain, wherein the spinal nerves are mainly responsible for receiving execution information transmitted by the terminal neurons, judging task execution effects, classifying the effects, matching execution flow information with a behavior library, searching whether a corresponding calibration strategy exists or not if a deviation occurs, reporting the calibration strategy and the effects to the brain by the spinal nerves, and optimizing and improving calibration efficiency by the brain; (1.3) the core network layer is the top of the framework, is equivalent to the brain, can generate and self-adaptively calibrate strategy resources and transfer the strategy resources to the network layer, and meanwhile, can complete the structure and function of security defense through learning, control and process the whole data through brain-like security, realize multitask integration, induction and decision making, and improve the security performance through autonomous learning.
As an improvement of the present invention, in the step (1), "safe neurons are deployed omnidirectionally" means that a large number of sensors need to be arranged in an information system to sense environmental changes.
As an improvement of the present invention, in the step (2), "integrating the functional elements and the security elements into the basic functional modules" refers to reconstructing an execution architecture of the information system, where the reconstructed architecture includes a public module and a private module for completing a specific task, and "constructing a task-oriented fine-grained monitoring mechanism for execution actions" refers to that each basic functional module corresponds to a basic action and the execution effect of the module is represented by an output generated by the action, when a task is submitted, analyzing the data to determine modules and execution sequences required by the tasks, monitoring the execution effect of the basic modules in the execution process, feeding back in real time and calibrating the execution deviation, meanwhile, a safe part needs to be integrated into the divided functional modules, so that the sensing and calibration of the neuron-like elements are realized, and the functional operation condition is monitored and configured and adjusted.
As an improvement of the present invention, the step (3) "calling the basic module to perform the operation according to the task execution condition, sensing the execution path in the execution process, finding the environmental change through feedback, and performing calibration according to the policy" means that after the security function is fused on the basis of the original function part, each parameter can be monitored while the basic task is completed in the task execution process, and then the monitored parameters are reported and the issued adjustment policy is received to reconfigure the function.
Compared with the prior art, the invention has the advantages that 1) the technical scheme integrates the function mapping from the human body neural control system to the information system, and provides a neural system-like control framework by using the safety protection mechanism based on the bionic control mechanism and the defense mechanism of the human body facing the internal and external safety threats; 2) according to the technical scheme, different safety components are deployed on different information scale levels, a multi-level hierarchical control mechanism is constructed, and a mechanism of fusing a basic function module and safety is provided; 3) according to the technical scheme, the sensing and control of the execution action are completed by deploying massive neurons in an information system, so that the task can be completed according to the expected effect; 4) according to the technical scheme, the method can consider the safety function deployment during the design of the information system, realize the high integration of the safety system and the information system, has better safety performance when the communication network has low defense efficiency, cannot process high-speed data and cannot deal with the problems of position threats, and can more effectively realize the dynamic active maintenance of the safety of the information system.
Drawings
FIG. 1 is a class neural system control architecture;
FIG. 2 is a task-oriented execution architecture;
FIG. 3 incorporates the modular infrastructure of the security function;
fig. 4 prototype system build framework.
The specific implementation mode is as follows:
for the purpose of enhancing an understanding of the present invention, the present embodiment will be described in detail below with reference to the accompanying drawings.
Example 1: referring to fig. 1, a method for information system security protection based on a bionic control mechanism includes the following steps:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
in this example, as shown in fig. 1, a neural system control architecture is given, a set of neural control flow of the information system is formed by simulating the main composition and the internal feedback principle of the neural control system, the neural system hierarchical architecture is roughly divided into neurons, spinal nerves and a brain, and a system architecture penetrating through an information system terminal, a network layer and a core network layer is constructed;
the detailed steps are as follows:
and (1.1) the terminal is mainly responsible for sensing, feedback and calibration, and comprises a large number of safety neurons, the activity of each terminal system is sensed and controlled through the neurons, the normal operation of an application task is monitored and maintained, the component modules of various applications operated by the terminal are effect components, and the neurons extend to each effect component. Meanwhile, in order to reduce the burden of the terminal, the neuron only executes low-power-consumption operations such as strategy assignment, environment perception and action calibration functions, and does not perform large-scale operation. The terminal application is executed in a task mode, and calls a corresponding module according to a preset strategy and executes the task. Various operation parameters are sensed in the execution process and fed back to the spinal nerves, and if deviation occurs, the terminal neuron commands the effector to carry out calibration according to a calibration strategy, such as: replacement of modules, reduction of load, etc.;
step (1.2) the network layer contains terminal nodes with interactive requirements at higher layers, these nodes: share a large amount of resources, are connected by a local or wide area network, and support the same organizational network. Network layer spinal nerves are utilized to coordinate the operation of the terminal neurons and to convey information between the terminal and the brain. The spinal nerves are mainly responsible for receiving execution information uploaded by terminal neurons, judging task execution effects, classifying the effects, matching execution flow information with a behavior library, searching whether a corresponding calibration strategy exists or not if deviation occurs, reporting the calibration strategy and the effects to the brain by the spinal nerves, optimizing by the brain and improving the calibration efficiency;
and (1.3) the core network layer is the top of the framework, is equivalent to a brain, and can generate and self-adaptively calibrate strategy resources and put down to the network layer. Meanwhile, the structure and the function of security defense can be perfected through learning, the overall data is controlled and processed through brain-like security, multi-task integration, induction and decision making are realized, and the security performance is improved through autonomous learning;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
during specific implementation, an execution architecture of the information system needs to be rebuilt, and the rebuilt task-oriented execution architecture comprises a public module and a private module for completing a specific task. The detailed steps are as follows:
(2.1) designing each basic function module in the system to correspond to a basic action, wherein the execution effect of the module is represented by the output generated by the action;
(2.2) when a task is submitted, analyzing the task to determine a module and an execution sequence required by the task, monitoring the execution effect of a basic module in the execution process, feeding back in real time and calibrating the execution deviation;
(2.3) building a module basic structure, integrating a safe part into the divided functional modules, realizing the sensing and calibration of the neuron-like elements, and monitoring and configuring and adjusting the functional operation condition;
the task-oriented execution architecture involved in step (2) is shown in fig. 2, and the basic structure of the module involved in step (2.3) is shown in fig. 3.
Step (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy;
in the specific implementation, the detailed steps of (3) are as follows:
(3.1) fusing a safety function on the basis of the original function part, constructing a prototype system frame by utilizing Erlang on a Linux (Ubuntu 16.04) system, realizing communication and encryption and decryption modules, and managing an operation mechanism by a safety management part in the constructed prototype system, wherein a task management part is responsible for system task decomposition and selecting modules and parameter setting according to task expectation;
(3.2) decomposing the action parameters of the communication module in the basic module into transmission rate and CPU occupancy rate, wherein the adjustment strategy is divided into the size of a transmission data block and transmission bandwidth, the action output parameters of the encryption and decryption module are divided into encryption and decryption speed and CPU occupancy rate, and the adjustment strategy is encryption strength;
(3.3) establishing a target task to finish encryption and transmission of data by using a communication module and an encryption and decryption module, wherein configurable options comprise: data block size per transmission, including
Figure DEST_PATH_IMAGE001
And
Figure 636113DEST_PATH_IMAGE002
(ii) a The transmission bandwidth may be set to 900Kb and 11 Mb; with AES encryption, there may be set no encryption, 128-bit encryption, and 256-bit encryption. Under configurable parameters, combining into 12 groups of strategy modes;
(3.4) monitoring various parameters while completing the basic task in the task execution process, including: the processing time of each sending task, the overall CPU occupancy rate of the tasks and the data transmission rate. Then, under the framework of a built-in safety neuron, reporting the monitoring parameters and receiving the issued adjustment strategy to reconfigure the functions, and when the data sent by the task is not required to be confidential but needs faster processing and transmission rate, selecting the data to be sent by the task
Figure 239178DEST_PATH_IMAGE002
900Kb, policy mode without encryption. The choice is made when the encryption requirements are relatively high and the processing speed and resource consumption requirements are relatively low
Figure 854484DEST_PATH_IMAGE001
900Kb, 256 bit encrypted policy mode;
(3.5) parameters executed by a module in the fine-grained monitoring system can sense the environmental change of the system, the encryption strength is improved when a listener exists in the network, an abnormal warning is sent out when sensing the deviation of the parameters such as the transmission rate, the processing time and the like, and the security strategy is adjusted by the upper layer;
the prototype system framework involved in step (3.1) is shown in fig. 4, and refers to that a running environment simulating neural control is built on a system kernel layer, and a functional part and a safety part of a module are highly fused together on an application environment level. The security management section manages the operation mechanism. The task management part decomposes the tasks of the system, and selects a module and sets parameters according to the expectation of the tasks. The operation monitoring part senses the operation process of the module. The execution adjustment performs a reconfiguration of the policy based on the feedback parameters. In addition, the resource management carries out unified management on the bottom layer resources of the system, and the upper layer is connected with the upper layer to carry out communication in the aspect of safety.
It should be noted that the above-mentioned embodiments are not intended to limit the scope of the present invention, and all equivalent modifications and substitutions based on the above-mentioned technical solutions are within the scope of the present invention as defined in the claims.

Claims (6)

1. An information system safety protection method based on a bionic control mechanism is characterized by comprising the following steps:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy.
2. The information system safety protection method based on the bionic control mechanism as claimed in claim 1, wherein in the step (1), "simulating the efficient neural control mechanism of the human body and constructing the neural system control architecture" means simulating the main composition and internal feedback principle of the neural control system to form a set of neural control flow of the information system, dividing the neural system hierarchical architecture into neurons, spinal nerves and brain roughly, and constructing a system architecture penetrating through the information system terminal, network layer and core network layer.
3. The information system safety protection method based on the bionic control mechanism as claimed in claim 1, wherein the layering method in step (1) is as follows:
(1.1) the terminal is mainly responsible for perception, feedback and calibration, it contains a large number of safe neurons, through the neuron perception and control each terminal system activity, monitor and maintain the application task normal going on, the terminal running various application module is the effect part, the neuron extends to each effect part, at the same time in order to reduce the terminal burden, the neuron only executes the strategy issue, environment perception, action calibration function such as low power consumption operation, does not do large-scale operation, the terminal application is executed in the way of task, according to the predetermined strategy calls the corresponding module and executes the task, in the execution process perception various operation parameters and feeds back to the spinal nerve, if the deviation appears, the terminal neuron then according to the calibration strategy command the effect to calibrate,
(1.2) the network layer comprises terminal nodes with interaction requirements at a higher layer, shares a large number of resources, is communicated by a local or wide area network and supports the same organization network, the network layer spinal nerves are utilized to coordinate the work of terminal neurons and transmit information between a terminal and a brain, the spinal nerves are mainly responsible for receiving execution information transmitted by the terminal neurons, so that the task execution effect is judged, the effect is classified, execution flow information is matched with a behavior library, if deviation occurs, whether a corresponding calibration strategy exists or not is searched, the spinal nerves report the calibration strategy and the effect to the brain, the brain optimizes the calibration strategy and improves the calibration efficiency;
(1.3) the core network layer is the top of the framework, is equivalent to the brain, can generate and self-adaptively calibrate strategy resources and transfer the strategy resources to the network layer, and meanwhile, can complete the structure and function of security defense through learning, control and process the whole data through brain-like security, realize multitask integration, induction and decision making, and improve the security performance through autonomous learning.
4. The information system safety protection method based on the bionic control mechanism as claimed in claim 2, wherein the "omnibearing deployment of the safety neurons" in the step (1) means that a large number of sensors need to be arranged in the information system to sense environmental changes.
5. The information system security protection method based on bionic control mechanism as claimed in claim 3, wherein in the step (2), "merging functional elements and security elements into basic functional modules" refers to reconstructing an execution architecture of the information system, the reconstructed architecture includes a public module and a private module for completing a specific task, "constructing a task-oriented fine-grained monitoring mechanism for execution actions" refers to that each basic functional module corresponds to a basic action and the execution effect of the module is reflected by the output generated by the action, when a task is submitted, the task is analyzed to determine the module and execution order required for completing the task, the execution effect of the basic module is monitored during execution, real-time feedback is given and execution deviation is calibrated, and meanwhile, a secure part needs to be merged into the divided functional modules, the sensing and calibration of the neuron-like elements are realized, and the function operation condition is monitored and configured and adjusted.
6. The information system safety protection method based on the bionic control mechanism according to claim 3 or 4, wherein in the step (3), "calling the basic module to execute the operation according to the task execution condition, sensing the execution path in the execution process, finding the environmental change through feedback, and calibrating according to the strategy" means that after the safety function is fused on the basis of the original function part, each parameter can be monitored while the basic task is completed in the task execution process, and then the monitored parameters are reported and the issued adjustment strategy is received to reconfigure the function.
CN202011413094.7A 2020-12-04 2020-12-04 Information system safety protection method based on bionic control mechanism Active CN112488300B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011413094.7A CN112488300B (en) 2020-12-04 2020-12-04 Information system safety protection method based on bionic control mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011413094.7A CN112488300B (en) 2020-12-04 2020-12-04 Information system safety protection method based on bionic control mechanism

Publications (2)

Publication Number Publication Date
CN112488300A true CN112488300A (en) 2021-03-12
CN112488300B CN112488300B (en) 2024-04-12

Family

ID=74939898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011413094.7A Active CN112488300B (en) 2020-12-04 2020-12-04 Information system safety protection method based on bionic control mechanism

Country Status (1)

Country Link
CN (1) CN112488300B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269112A1 (en) * 2008-11-21 2010-10-21 Thales System and method for the dynamic deployment of distributed treatments
CN108492021A (en) * 2018-03-16 2018-09-04 前海梧桐(深圳)数据有限公司 Enterprise factor group representation method and its system based on human brain neural network's model
CN109587174A (en) * 2019-01-10 2019-04-05 广东电网有限责任公司信息中心 Composite defense method and system for network protection
CN109617873A (en) * 2018-12-06 2019-04-12 中山大学 A kind of flow attacking system of defense based on SDN cloud security function services tree-model

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269112A1 (en) * 2008-11-21 2010-10-21 Thales System and method for the dynamic deployment of distributed treatments
CN108492021A (en) * 2018-03-16 2018-09-04 前海梧桐(深圳)数据有限公司 Enterprise factor group representation method and its system based on human brain neural network's model
CN109617873A (en) * 2018-12-06 2019-04-12 中山大学 A kind of flow attacking system of defense based on SDN cloud security function services tree-model
CN109587174A (en) * 2019-01-10 2019-04-05 广东电网有限责任公司信息中心 Composite defense method and system for network protection

Also Published As

Publication number Publication date
CN112488300B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
Singh et al. Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence
Aïvodji et al. IOTFLA: A secured and privacy-preserving smart home architecture implementing federated learning
Ahmed et al. An energy-efficient data aggregation mechanism for IoT secured by blockchain
Deng et al. Task scheduling for smart city applications based on multi-server mobile edge computing
US20220345484A1 (en) Zero trust architecture for networks employing machine learning engines
CN110417849A (en) Insertion type industrial equipment edge calculations system
DE102021206841A1 (en) METHOD OF ENCRYPTING DATA-AT-REST FOR DATA RESIDING ON KUBERNETES PERSISTENT VOLUMES
Zhang et al. Interpreting AI for networking: Where we are and where we are going
Nayak et al. Ml-mds: Machine learning based misbehavior detection system for cognitive software-defined multimedia vanets (csdmv) in smart cities
CN116781423B (en) Sharing method and system for industrial Internet data
Awaysheh et al. Big data security frameworks meet the intelligent transportation systems trust challenges
Dai et al. Digital twin envisioned secure air-ground integrated networks: A blockchain-based approach
Abuseta A fog computing based architecture for IoT services and applications development
CN114338753A (en) Vehicle cloud cooperative computing system, equipment and storage medium
da Silva et al. Multichannel ALOHA optimization for federated learning with multiple models
Kumar et al. Blockchain technology with applications to distributed control and cooperative robotics
CN112488300A (en) Information system safety protection method based on bionic control mechanism
Pivoto et al. A detailed relevance analysis of enabling technologies for 6G architectures
DE112021003656T5 (en) ROLE DELEGATION IN ATTESTATION VERIFIERS
CN102238571B (en) Apparatus of Internet of Things machine to machine/man (M2M) business processing, system and method thereof
Hinchey et al. Modeling for NASA autonomous nano-technology swarm missions and model-driven autonomic computing
Singh et al. Security and Privacy in Fog/Cloud-based IoT Systems for AI and Robotics
Maksymyuk et al. Deep learning based mobile network management for 5G and beyond
Yassein et al. Combining software-defined networking with Internet of Things: Survey on security and performance aspects
Alharasees et al. Human Factors in the Age of Autonomous UAVs: Impact of Artificial Intelligence on Operator Performance and Safety

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant