Page 10 - 大数据背景下计算机信息安全及防护
P. 10

第三节 物联网典型安全漏洞与防护技术······································· 142
               第六章 人工智能安全防护 ······························································ 147

                   第一节 人工智能核心技术发展 ··················································· 147

                   第二节 人工智能安全风险防控现状············································· 158
                   第三节 人工智能安全风险治理体系的完善···································· 171
               第七章 信用大数据应用 ································································· 177

                   第一节 社会信用体系建设发展 ··················································· 177

                   第二节 社会信用体系建设路径 ··················································· 186
                   第三节 社会信用大数据的特点与形成·········································· 198
                   第四节 信用大数据在各领域的应用············································· 202

               参考文献······················································································· 219
   5   6   7   8   9   10   11   12   13   14   15