2022
DOI: 10.1155/2022/5677634
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Control Model of Power Information System Access Based on Artificial Intelligence Technology

Abstract: Looking at the issues of low efficiency, poor control performance, and difficult access control of the traditional role-based access control model, an artificial intelligence technique-based power information system access control model has been designed. The detector is designed by artificial intelligence technology, combining artificial neural network, and artificial immune algorithm, which provide the basis for checking the access request module. It has been proved that the design model can effectively supp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 18 publications
0
14
0
1
Order By: Relevance
“…Blockchain technology can transform the traditional healthcare system by maintaining patient data privacy and security [1]. Blockchain has the power to change the way patients' electronic health records are transferred and stored by providing safer ways for medical information transfer in the healthcare industry and securing it via a randomized peerto-peer network [2,3]. e implementation of technology makes electronic health records (EHRs) robust and secure [4].…”
Section: Introductionmentioning
confidence: 99%
“…Blockchain technology can transform the traditional healthcare system by maintaining patient data privacy and security [1]. Blockchain has the power to change the way patients' electronic health records are transferred and stored by providing safer ways for medical information transfer in the healthcare industry and securing it via a randomized peerto-peer network [2,3]. e implementation of technology makes electronic health records (EHRs) robust and secure [4].…”
Section: Introductionmentioning
confidence: 99%
“…Many DDoS attacks make advantage of domain name servers (DNS), which convert IP addresses into human-readable website names. When DNS is shifted to the blockchain, resources may be shared among several nodes, making it difficult for attackers to control the database [19,20]. As a result, finding current research on the application of blockchain to the problem of cyber security is vital in order to comprehend how evolving technologies might assist mitigate growing threats.…”
Section: Introductionmentioning
confidence: 99%
“…Both academia and industry in the transportation sector are interested in VANET, which is an important and interesting MANET application. e VANET is an important future solution for improving performance and maintaining a safe transportation system [4,5]. Collision avoidance, safety, blind crossing, dynamic route routing, real-time traffic condition monitoring, and other applications are all possible using VANETs.…”
Section: Introductionmentioning
confidence: 99%