Proceedings of the 2nd International Conference on Artificial Intelligence and Cloud Computing (ICAICC 2022)

Research on the Optimization of Information Technology Security Under the Circumstance of 5G Network

Authors
Jiali Zhou1, *
1Philippine Christian University Center for International Education, Manila, Philippines
*Corresponding author. Email: 970256336@qq.com
Corresponding Author
Jiali Zhou
Available Online 10 November 2022.
DOI
10.2991/978-94-6463-002-2_11How to use a DOI?
Keywords
Network environment; Information technology; Security
Abstract

In 2021, 5G has been widely and maturely commercialized, and has become one of the most competitive technologies in communication technology. To a certain extent, it is a hot spot in today’s social development and competition. Countries with scientific research capabilities are competing for high-tech in the 5G field. As far as the country is concerned, the right to speak of advanced technology in the world will also increase, and it will take the lead in the development of future network information technology. In the 5G world, the security of information technology is the main aspect of competition. In the network age, 5G has changed the development model of the entire society and subverted people’s work, study, and life. With the rapid development of the network environment, the value of information has become more significant. How to ensure information security and improve the stability of 5G networks has been attracted people’s attention.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Artificial Intelligence and Cloud Computing (ICAICC 2022)
Series
Advances in Computer Science Research
Publication Date
10 November 2022
ISBN
10.2991/978-94-6463-002-2_11
ISSN
2352-538X
DOI
10.2991/978-94-6463-002-2_11How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Jiali Zhou
PY  - 2022
DA  - 2022/11/10
TI  - Research on the Optimization of Information Technology Security Under the Circumstance of 5G Network
BT  - Proceedings of the 2nd International Conference on Artificial Intelligence and Cloud Computing (ICAICC 2022)
PB  - Atlantis Press
SP  - 80
EP  - 87
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-002-2_11
DO  - 10.2991/978-94-6463-002-2_11
ID  - Zhou2022
ER  -