Exploration and Research of AI-based Cyberspace Security on the Personnel Cultivating—Taking Guangdong University of Science and Technology as an Example
DOI: 10.23977/jhrd.2024.060401 | Downloads: 10 | Views: 309
Author(s)
Ma Haifei 1,2, Chai Wen Chuah 1, Fan Yong 1
Affiliation(s)
1 Academy of Computer Science, Guangdong University of Science and Technology, Dongguan, China
2 Key Lab of Education Block Chain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China
Corresponding Author
Ma HaifeiABSTRACT
Following limitations of cyberspace security professional teachers, unclear fostering goals and outstanding result under the background of artificial intelligence. Hence, to improve the quality of cyberspace security personnel training, this paper takes Guangdong University of Science and Technology as an example to discuss cyberspace security personnel training. We propose the following discussion from five aspects: optimize curriculum system, construct teacher team, emphasis discipline competition and scientific research, reform teaching method and build laboratory. It aims to grasp the new perspective of cyberspace security construction under the background of artificial intelligence, and build a new path to improve the quality of talent cultivating.
KEYWORDS
Cyberspace security; Artificial intelligence; Talent training; Application-oriented undergraduateCITE THIS PAPER
Ma Haifei, Chai Wen Chuah, Fan Yong, Exploration and Research of AI-based Cyberspace Security on the Personnel Cultivating—Taking Guangdong University of Science and Technology as an Example. Journal of Human Resource Development (2024) Vol. 6: 1-6. DOI: http://dx.doi.org/10.23977/jhrd.2024.060401.
REFERENCES
[1] WU J .Development paradigms of cyberspace endogenous safety and security[J].Science China(Information Sciences),2022,65(05):264-266.
[2] WU J, LI J, JI X. Security for cyberspace: challenges and opportunities[J].Frontiers of Information Technology & Electronic Engineering,2018,19(12):1459-1461.
[3] He L,Ren Q,Ma B, et al.Anti-Attacking Modeling and Analysis of Cyberspace Mimic DNS[J].China Communications, 2022,19(05):218-230.
[4] Quan R,Jiangxing W,Lei H .Performance Modeling Based on GSPN for Cyberspace Mimic DNS[J].Chinese Journal of Electronics,2020,29(04):738-749.
[5] Smith L K, Southerland S A. Reforming practice or modifying reforms? Elementary teachers' response to the tools of reform[J]. Journal of Research in Science Teaching: The Official Journal of the National Association for Research in Science Teaching, 2007, 44(3): 396-423.
[6] Zhai X, Chu X, Chai C S, et al. A Review of Artificial Intelligence (AI) in Education from 2010 to 2020[J]. Complexity, 2021, 2021(1): 8812542.
Downloads: | 5709 |
---|---|
Visits: | 141742 |
Sponsors, Associates, and Links
-
Information Systems and Economics
-
Accounting, Auditing and Finance
-
Industrial Engineering and Innovation Management
-
Tourism Management and Technology Economy
-
Journal of Computational and Financial Econometrics
-
Financial Engineering and Risk Management
-
Accounting and Corporate Management
-
Social Security and Administration Management
-
Population, Resources & Environmental Economics
-
Statistics & Quantitative Economics
-
Agricultural & Forestry Economics and Management
-
Social Medicine and Health Management
-
Land Resource Management
-
Information, Library and Archival Science
-
Manufacturing and Service Operations Management
-
Operational Research and Cybernetics