Paper
28 March 2023 Application analysis of machine learning in cyberspace security research
Wenzhuo Du, Gerun Wang, Xuanbo Ma, Xintian Yu
Author Affiliations +
Proceedings Volume 12566, Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022); 125660N (2023) https://doi.org/10.1117/12.2668873
Event: Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022), 2022, Chongqing, China
Abstract
With the rapid development of society and the continuous change of the times, my country's Internet technology has achieved great development space. Cloud computing, Internet of Things, etc. have formed the current era of big data. At present, there are a lot of network access points, and the networked devices among them will generate a lot of data, so there are higher requirements for the security of the cyberspace, and it is also a golden opportunity. Traditional cyberspace security research is relatively inefficient in data processing, machine learning has strong adaptability, and strong learning capabilities also ensure the security of cyberspace. Under such a social background, it is necessary to give full play to the role of machine learning. After applying machine learning, it can effectively solve the problems existing in cyberspace security research. Based on this, this paper discusses the application of machine learning in cyberspace security research.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenzhuo Du, Gerun Wang, Xuanbo Ma, and Xintian Yu "Application analysis of machine learning in cyberspace security research", Proc. SPIE 12566, Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022), 125660N (28 March 2023); https://doi.org/10.1117/12.2668873
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Machine learning

Network security

Computer security

Information security

Analytical research

Data modeling

Data processing

Back to Top