Education, Science, Technology, Innovation and Life
Open Access
Sign In

Exploration and Research of AI-based Cyberspace Security on the Personnel Cultivating—Taking Guangdong University of Science and Technology as an Example

Download as PDF

DOI: 10.23977/jhrd.2024.060401 | Downloads: 10 | Views: 309

Author(s)

Ma Haifei 1,2, Chai Wen Chuah 1, Fan Yong 1

Affiliation(s)

1 Academy of Computer Science, Guangdong University of Science and Technology, Dongguan, China
2 Key Lab of Education Block Chain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China

Corresponding Author

Ma Haifei

ABSTRACT

Following limitations of cyberspace security professional teachers, unclear fostering goals and outstanding result under the background of artificial intelligence. Hence, to improve the quality of cyberspace security personnel training, this paper takes Guangdong University of Science and Technology as an example to discuss cyberspace security personnel training. We propose the following discussion from five aspects: optimize curriculum system, construct teacher team, emphasis discipline competition and scientific research, reform teaching method and build laboratory. It aims to grasp the new perspective of cyberspace security construction under the background of artificial intelligence, and build a new path to improve the quality of talent cultivating.

KEYWORDS

Cyberspace security; Artificial intelligence; Talent training; Application-oriented undergraduate

CITE THIS PAPER

Ma Haifei, Chai Wen Chuah, Fan Yong, Exploration and Research of AI-based Cyberspace Security on the Personnel Cultivating—Taking Guangdong University of Science and Technology as an Example. Journal of Human Resource Development (2024) Vol. 6: 1-6. DOI: http://dx.doi.org/10.23977/jhrd.2024.060401.

REFERENCES

[1] WU J .Development paradigms of cyberspace endogenous safety and security[J].Science China(Information Sciences),2022,65(05):264-266.
[2] WU J, LI J, JI X. Security for cyberspace: challenges and opportunities[J].Frontiers of Information Technology & Electronic Engineering,2018,19(12):1459-1461. 
[3] He L,Ren Q,Ma B, et al.Anti-Attacking Modeling and Analysis of Cyberspace Mimic DNS[J].China Communications, 2022,19(05):218-230.
[4] Quan R,Jiangxing W,Lei H .Performance Modeling Based on GSPN for Cyberspace Mimic DNS[J].Chinese Journal of Electronics,2020,29(04):738-749.
[5] Smith L K, Southerland S A. Reforming practice or modifying reforms? Elementary teachers' response to the tools of reform[J]. Journal of Research in Science Teaching: The Official Journal of the National Association for Research in Science Teaching, 2007, 44(3): 396-423.
[6] Zhai X, Chu X, Chai C S, et al. A Review of Artificial Intelligence (AI) in Education from 2010 to 2020[J]. Complexity, 2021, 2021(1): 8812542.

Downloads: 5709
Visits: 141742

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.