Research on Network Dynamic Security Policy Model Based on Neural Network
Abstract
References
Index Terms
- Research on Network Dynamic Security Policy Model Based on Neural Network
Recommendations
Research on Network Security Evaluation Model Based on AHP and BP Neural Network
icWCSN '23: Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor NetworksThe Internet's sharing and openness have made information interaction more vulnerable to security risks. As a result, a comprehensive evaluation of the security of computer network systems has become a more effective means of preventing various network ...
Security Model Based on Network Business Security
ICCTD '09: Proceedings of the 2009 International Conference on Computer Technology and Development - Volume 01Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the ...
Intelligent evaluation of computer network security based on neural network
This study aims to use neural network theory to analyze and evaluate computer network security. Firstly, the evaluation model of computer network security was given based on relevant literature, and the corresponding index system was constructed, ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 12Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format