SUN’IY INTELLEKT YORDAMIDA KIBERXAVFSIZLIKNI TA’MINLASH USULLARI
##semicolon##
Sun’iy intellekt, kiberxavfsizlik, mashinaviy o‘qitish, chuqur o‘rganish (deep learning), neyron tarmoqlar, kiberhujumlar, zararli dasturlar, phishing, axborot xavfsizligi, ma’lumotlar himoyasi, tahdidlarni aniqlash, anomaliya aniqlash, avtomatik himoya tizimlari, tarmoq xavfsizligi, raqamli xavfsizlik.Abstrak
Ushbu maqolada sun’iy intellekt texnologiyalarining kiberxavfsizlikni ta’minlashdagi roli va ahamiyati tahlil qilingan. Tadqiqotda sun’iy intellekt asosida kiberhujumlarni aniqlash, zararli dasturlarni bloklash va phishing hujumlaridan himoyalanish usullari o‘rganildi. Shuningdek, an’anaviy va AI asosidagi xavfsizlik tizimlari o‘rtasidagi farqlar ko‘rib chiqildi. Natijalar shuni ko‘rsatadiki, sun’iy intellekt kiberxavfsizlik sohasida tezkor va samarali himoya vositasi sifatida muhim o‘rin tutadi.
##submission.citations##
A. M. Turing, “Computing Machinery and Intelligence,” Mind, 1950.
J. McCarthy et al., “A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence,” 1956.
M. Minsky, The Society of Mind, Simon & Schuster, 1986.
I. Goodfellow, Y. Bengio, A. Courville, Deep Learning, MIT Press, 2016.
D. Amodei et al., “Concrete Problems in AI Safety,” 2016.
Apache Software Foundation, Hadoop Documentation, https://hadoop.apache.org
Apache Software Foundation, Spark Documentation, https://spark.apache.org
R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, 1978.
Turing, Computing Machinery and Intelligence, 1950.
J. McCarthy et al., A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence, 1956.
M. Minsky, The Society of Mind, 1986.
I. Goodfellow et al., Deep Learning, 2016.
Amodei et al., AI Safety Paper, 2016.
Apache Software Foundation, Apache Hadoop Documentation.
Apache Software Foundation, Apache Spark Documentation.
R. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, 1978.