Biblio
Filters: Keyword is training process [Clear All Filters]
Soft Multi-Factor Authentication. 2020 Wave Electronics and Its Application in Information and Telecommunication Systems (WECONF). :1–7.
.
2020. The Classification of devices involved in authentication and classification of authentication systems by type and combination of protocols used are proposed. The system architecture for soft multi-factor authentication designed and simulated.
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms. 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). :399—402.
.
2019. As we all know, computer network security evaluation is an important link in the field of network security. Traditional computer network security evaluation methods use BP neural network combined with network security standards to train and simulate. However, because BP neural network is easy to fall into local minimum point in the training process, the evalu-ation results are often inaccurate. In this paper, the LM (Levenberg-Marquard) algorithm is used to optimize the BP neural network. The LM-BP algorithm is constructed and applied to the computer network security evaluation. The results show that compared with the traditional evaluation algorithm, the optimized neural network has the advantages of fast running speed and accurate evaluation results.