期刊文献+

SVM与ANN在网络安全风险评估中的比较研究 被引量:2

Study on the Network Security Risk Evaluation SVM and ANN
下载PDF
导出
摘要 该文对SVM和ANN在网络安全风险评估方面的应用进行了比较研究,首先介绍了ANN的工作原理,然后分别将两种方法都应用到网络安全风险评估中,对其评估效果进行了比较。结果发现SVM在小训练样本的分类正确率,泛化能力和训练、测试速度方面,均优越于ANN,是一种更加优越的风险评估方法。 In this paper, SVM and ANN in the network security risk assessment carried out a comparative study of the application, first introduced the working principle of ANN, and then the two methods are respectively applied to the network security risk assessment, their assessment results were compared. The results showed that SVM training samples in a small classification accuracy rate, generalization ability and training, test speed, are superior to ANN, is a more superior risk-assessment methodologies.
作者 高述涛
出处 《电脑知识与技术》 2009年第11X期9380-9381,共2页 Computer Knowledge and Technology
关键词 支持向量机 网络安全 风险评估 统计学习理论 support vector machine network security risk evaluation statistical learning theory
  • 相关文献

同被引文献19

  • 1安伟刚,李为吉.改进的粒子群优化算法及其工程应用[J].机械科学与技术,2005,24(4):415-417. 被引量:8
  • 2张顶学,关治洪,刘新芝.基于PSO的RBF神经网络学习算法及其应用[J].计算机工程与应用,2006,42(20):13-15. 被引量:44
  • 3Wu Xinmiao, Qie Zhihong, Liu Hongquan, et al. Dam's Safety Monitoring Statistical Model Optimi- zation Basing on the GA and AIC[A]. The Sixth World Congress on Intelligent Control and Automa- tion[C]. Dalian, 2006,2:7 855-7 859.
  • 4马驰,阮秋琦.基于离散微粒群优化算法的SVM参数选择[J].计算机技术与发展,2007,17(12):20-23. 被引量:3
  • 5SUN Yang, BOSCH L T, BOYES L. Hybrid HMM/BLSTM-RNN for robust speech recognition[ C ]//Prec of the 13th International Confe- rence on TSD. 2010:400-407.
  • 6WHITTAKER J A. What is software testing? And why is it so hard:? [ J]. IEEE Software ,2000,17( 1 ) :70-79.
  • 7DENNIS K P, DAVID L P. Generating a test oracle from program documentation [ C ]//Proc of International Symposium on Software Testing and Analysis. New York : ACM Press, 1 995 : 58- 65.
  • 8BOUSQUET L, OUABDESSELAM F, RICH1ER J, et al. Lutess: a specification-driven testing environment for synchronous software [ C ]//Proc of the 21 st International Conference on Software Engineer- ing. New York : ACM Press, 1999:267- 276.
  • 9DILLON L K, RAMAKR!SHNA Y S. Generating oracles from your favorite temporal logic specifications[ C]//Proc of the 4th ACM SIG- SOFT Symposium on the Foundations of Software Engineering. New York: ACM Press, 1996 : 106-117.
  • 10SCHROEDER P J, FAHERTY P, KOREL B. Generating expected results for automated blackbox testing[ C ]//Proc of the 17th IEEE In- ternatiortal Conference on Automated Software Engineering. 2002 : 139- 148.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部