Researches on the Network Security Evaluation Method Based on BP Neural Network

Article Preview

Abstract:

This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

470-473

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhao Dongmei, Liu Haifeng, Liu Chenguang. The information security risk assessment based on the BP neural network fJ] Computer Engineering and Application, 2OO7, 43 (1): 139-141.

Google Scholar

[2] Shen Zongqing, Liu Xilin. Distributor performance evaluation and application based on the BP neural network [J]. Journal of East China Jiaotong University, 2007, 24(4): 108-110.

Google Scholar

[3] Cai Bing. The design methods of the hidden layer structure of the BP neural network [J]. Tonghua Teachers College, Post 20, 28 (2): 18-19.

Google Scholar

[4] Guo Sicong, Chen Gang. Soft computing methods in the Information Science [M]. Shenyang: Northeastern University Press, (2001).

Google Scholar