期刊文献+

基于人工神经网络的主机安全量化评估研究 被引量:3

Research of computer security quantitative evaluation based on artificial neural networks
下载PDF
导出
摘要 基于人工神经网络的方法对主机安全性能进行量化评估。分析了BP人工神经网络模型的网络结构及学习算法,分析了影响目标主机安全性能的可能因素,并应用BP神经网络模型对目标主机的安全性能进行样本训练及实际测试。基于人工神经网络的主机安全量化评估为评价目标主机的安全性能提供了可行的方法。 The security performance of target host is assessed quantitatively based on the method of manual neural network. Network framework and learning algorithm of BP neural networks are analyzed and then some factors are brought forward influencing host's security performance. In addition, thetraining samples and practical testing of the host's securitycapability in terms ofBP neural networks are offered. Computer security quantitative assessment based on manual neural network provides a feasible method for the research of assessing security performance of target host.
作者 夏阳 陆余良
出处 《计算机工程与设计》 CSCD 北大核心 2005年第6期1478-1480,共3页 Computer Engineering and Design
关键词 神经网络 安全评估 量化因素 neural networks security evaluation quantitative ingredient
  • 相关文献

参考文献5

  • 1Pedrycz W. Fuzzy set in pattern recognition: methodology and methods[J].Pattern Recognition, 1990,23(1/2): 121-146.
  • 2Tahani H, Keller J. Information fusion computer vision using the fuzzy integral[J].IEEE Trans Syst Man and Cybern, 1990,20(3):733-741.
  • 3Walley P. Measures of uncertainty in expert system[J].Artif Intell 1996,83(1):1-58.
  • 4Cybenko D H. Approximation by superpositions of a sigmoidal function[J].Math Contrl,Signals,Syst,1989,(2) :303-314.
  • 5Hush D R, Home B G. Progree in supervised neural networks[J].IEEE Signal Processing Magazine, 1993,(1):8-39.

同被引文献24

  • 1谢赞福,魏文国.信息安全设施中入侵检测技术探讨[J].计算机工程与设计,2004,25(3):390-393. 被引量:8
  • 2李艺,李新明.对网络安全问题的探讨[J].计算机工程与设计,2004,25(7):1137-1139. 被引量:14
  • 3陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:28
  • 4王宇,吴忠望,卢昱.信息网络安全控制[J].计算机工程与设计,2005,26(12):3183-3186. 被引量:14
  • 5TimothyJRoss 钱同惠 沈其聪 葛晓滨.模糊逻辑及其工程应用[M].北京:电子工业出版社,2001..
  • 6Fox K,Henning R,Farrell J.A prototype next generation information assurance tool-a data fusion model for information systems defense[J].Proceeding of the 7th World Multiconference on Systemics,Cybernetics and Informatics (SCI 2003),2000,1 (6):284-289.
  • 7Hairong Qi,Sitharama Iyengar S,Krishnendu Chakrabarty.Multiresolution data integration using mobile agents in distributed sensor networks[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C,2001,31(3):383-391.
  • 8Shasha D, Lazere C. Natrual Computing: DNA, Quan- tum Bits, and Future of Smart Machines[ M ]. First Edi- tion. USA: W. W Norton & Co, 2010:2-3.
  • 9Benjamin J Colfer. Science of Cyber Security and a Road- map to Research [ M ]. First Edition. USA : Nova Science Publishers Inc, 2012 : 108-111.
  • 10Dorigo M, Mam Iezzo V, Colom I A. Ant System: Opti- mization by a Colony of Cooperating Agents [ J ]. IEEE Trans on SMC,1996, 26(1) :29-41.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部