Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

被引:0
|
作者
Ruchkin, V. N. [1 ]
Kostrov, B. V. [2 ]
Fulin, V. A. [1 ]
机构
[1] Ryazan State Univ, Ryazan, Russia
[2] Ryazan State Radio Engn Univ, Ryazan, Russia
关键词
security strategy; information security; cooperative game of chicken; business incentive balance; threat protection; sufficient security; infrastructure security; Internet of Things security maturity model; security algorithms; architecture; multicore; hierarchical; clustering; computer system; expert system; user interface;
D O I
10.3103/S014641162208020X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing-and in some cases improving-the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
引用
收藏
页码:970 / 980
页数:11
相关论文
共 50 条
  • [1] Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
    V. N. Ruchkin
    B. V. Kostrov
    V. A. Fulin
    Automatic Control and Computer Sciences, 2022, 56 : 970 - 980
  • [2] Intelligent evaluation of computer network security based on neural network
    Wang, Longge
    Yu, Junyang
    Qiao, Baojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (03) : 2887 - 2891
  • [3] Computer Network Security Evaluation Based on Intelligent Algorithm
    Sun Ming
    2017 SIXTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGIES (FGCT), 2017, : 88 - 91
  • [4] Weightless neural network parameters and architecture selection in a quantum computer
    da Silva, Adenilton J.
    de Oliveira, Wilson R.
    Luderrnir, Teresa B.
    NEUROCOMPUTING, 2016, 183 : 13 - 22
  • [5] Computer network security evaluation model based on neural network
    Li, Xinwei
    Chen, Hui
    Ariann, Bryan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 71 - 78
  • [6] Research on Computer Network Security Evaluation Based on Neural Network
    Gao, Jimin
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 665 - 670
  • [7] A hybrid anycast network architecture and intelligent server selection strategy for multimedia services
    Yuan, Sha
    Lin, Tao
    Zhang, Guoqiang
    An, Wei
    Li, Yang
    Song, Ci
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2014, 25 (04): : 407 - 421
  • [8] Design and implementation of security architecture based on enterprise computer network
    Han, Hui-Lian
    Xu, Li
    Gong, Qing-Yong
    Dai, Xiu-Jiao
    Huabei Gongxueyuan Xuebao/Journal of North China Institute of Technology, 2005, 26 (03): : 187 - 192
  • [9] A Method for Intelligent Road Network Selection Based on Graph Neural Network
    Guo, Xuan
    Liu, Junnan
    Wu, Fang
    Qian, Haizhong
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2023, 12 (08)
  • [10] Computer network security evaluation simulation model based on neural network
    Tang, Ying
    Elhoseny, Mohamed
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) : 3197 - 3204