scholarly journals Computer Network Security Evaluation Based on LM-BP Neural Network

Author(s):  
Zhenquan Huo
2014 ◽  
Vol 686 ◽  
pp. 470-473 ◽  
Author(s):  
Yi Bin Zhang ◽  
Ze Quan Yan

This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.


2014 ◽  
Vol 8 (1) ◽  
pp. 766-771
Author(s):  
Shujuan Jin

Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100- group data on the computer network security evaluation of different scales via expert scoring, and normalize them; Result: the evaluation model based on NN is simple and practicable to network security evaluation and can eliminate disturbance of the subjective factors of the human being. The simulation results indicate that the system can reduce relative output error and improve correctness rate of evaluation. Conclusion: The NN model is very valuable in research on the computer network security evaluation system, which can offset weaknesses of the past evaluation methods to some extent, improve precision of the evaluation results, and provide reference to prediction and control of the network security problems in future.


2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document