期刊文献+

基于离散型Hopfield网络的计算机网络安全等级分类研究 被引量:1

Research on Computer Network Security Classification Based on Discrete Hopfield Network
下载PDF
导出
摘要 随着计算机技术与互联网技术迅猛发展,我国计算机与网络技术均得到了明显提高。但随之而来的网络安全问题日益突出。目前网络安全问题已经成为人们普遍关注的问题,在对计算机网络进行评价与安全等级分类当中,最为常用的技术便是神经网络。对此就计算机网络安全评价体系构建原则与安全评价原则入手分析,并对提出一种基于离散型Hopfield网络的计算机网络安全等级。 With the rapid development of computer technology and Internet technology, China's computer and network technology has been significantly improved. However, with the widespread application of computer and Internet technology, people's daily life is changing. At the same time, network security is followed. At present,the problem of network security has become a common concern. In the evaluation of computer network and the classification of security level, the most commonly used technology is the neural network. This paper analyzes the principle of computer network security evaluation system and the principle of security evaluation, and puts forward a computer network security level based on discrete Hopfield network.
作者 王钧玉 Wang Junyu(Sanmenxia Polytechnic,Sanmenxia 472000,China)
出处 《安徽电子信息职业技术学院学报》 2018年第3期27-30,共4页 Journal of Anhui Vocational College of Electronics & Information Technology
关键词 离散型Hopfield网络 计算机网络 安全等级 分类研究 Discrete Hopfield network computer network security level Classification Research
  • 相关文献

参考文献8

二级参考文献50

  • 1许福永,申健,李剑英.网络安全综合评价方法的研究及应用[J].计算机工程与设计,2006,27(8):1398-1400. 被引量:38
  • 2武少杰.云计算下虚拟环境安全的关键技术研究[D].郑州:解放军信息工程大学,2012.
  • 3楼文高,姜丽,孟祥辉.计算机网络安全综合评价的神经网络模型[J].计算机工程与应用,2007,43(32):128-131. 被引量:18
  • 4LIN Guoyuan, BIE Yuyu, LEI Min, et al. ACO-BTM A Behavior Trust Model in Cloud Computing Environment [J]. International Journal of Computational Intelligence Systems, 2014, 7(4):785-795.
  • 5BELL D E, PADULA L J L. Unified Exposition and Multics Interpretation[R]. USA: Secure Computer System. MTR 2997 Rev 1, 1976.
  • 6Biba K J. Integrity Consideratiom for Secure Computer Systems[R]. USA: US Air Force Electronic System Division, Technical Report. MTR 3153, 1977.
  • 7MYERS A C, LISKOV B. Protecting Privacy Using the Decentralized Label Model [J]. ACM Transactiom on Computer Systems, 2000, 9(4):410-442.
  • 8SHI Q, ZHANG N. An effective model for composition of secure systems [J]. The Journal of Systems and Software, 1998, 43 (3) :233-244.
  • 9LU W P, SUNDARESHAN M K. A model for multilevel security in computer networks [J]. IEEE Transactions on Software Engineering, 1990, 16(6): 647-659.
  • 10LEVIN TE, IRVINE CE, NGUYEN TD. Least Privilege in Separation Kernels [C]//IEEE. Proceedings of the IEEE International Conference on Security and Cryptography. Piscataway, NJ: IEEE Press, 2006: 355-362.

共引文献38

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部