Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016)

Application of Neural Network Model Combined with Fuzzy Theory in Computer Network Security

Authors
Xiaotian Liu
Corresponding Author
Xiaotian Liu
Available Online September 2016.
DOI
10.2991/icence-16.2016.32How to use a DOI?
Keywords
Fuzzy theory, Neural network model, Computer, Network security, Application.
Abstract

With continuous development of science and technology, actual data integration and operating path also change greatly. To better improve transmission accuracy of overall data information, and guarantee optimal establishment of computer network security system, accuracy of overall system can improve fundamentally and more efficient computer security treatment measures can be established only when efficient network model operates. This paper simply analyzes the connotation of computer network security risk assessment model, intensively interprets the principle of fuzzy theory and composition of neural network model and finally discusses neural network model of fuzzy theory and fusion system of computer network security. This paper aims to verify system security performance through effective data analysis.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016)
Series
Advances in Computer Science Research
Publication Date
September 2016
ISBN
978-94-6252-229-9
ISSN
2352-538X
DOI
10.2991/icence-16.2016.32How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xiaotian Liu
PY  - 2016/09
DA  - 2016/09
TI  - Application of Neural Network Model Combined with Fuzzy Theory in Computer Network Security
BT  - Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016)
PB  - Atlantis Press
SP  - 152
EP  - 156
SN  - 2352-538X
UR  - https://doi.org/10.2991/icence-16.2016.32
DO  - 10.2991/icence-16.2016.32
ID  - Liu2016/09
ER  -