Page 10 - 大数据背景下计算机信息安全及防护
P. 10
第三节 物联网典型安全漏洞与防护技术······································· 142
第六章 人工智能安全防护 ······························································ 147
第一节 人工智能核心技术发展 ··················································· 147
第二节 人工智能安全风险防控现状············································· 158
第三节 人工智能安全风险治理体系的完善···································· 171
第七章 信用大数据应用 ································································· 177
第一节 社会信用体系建设发展 ··················································· 177
第二节 社会信用体系建设路径 ··················································· 186
第三节 社会信用大数据的特点与形成·········································· 198
第四节 信用大数据在各领域的应用············································· 202
参考文献······················································································· 219

