On some artificial intelligence methods and technologies for cloud-computing protection


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed.

About the authors

A. A. Grusho

Federal Research Center Informatics and Control

Author for correspondence.
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

M. I. Zabezhailo

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

A. A. Zatsarinnyi

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

V. O. Piskovskii

Applied Research Center for Computer Networks

Email: grusho@yandex.ru
Russian Federation, Moscow, 142784

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2017 Allerton Press, Inc.