2014
DOI: 10.1016/j.proeng.2014.03.111
|View full text |Cite
|
Sign up to set email alerts
|

Application of Neural Networks in Computer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…This section highlights discusses, compares, summarizes and critiques more than eighty research articles on artificial neural network model's application to the diverse area of the economy. The comparison was made based on (i) author(s)/year of publication (ii) ANN modeling (iii) ANN area of application (iii) studied contribution to human challenges (with references to Supplementary Table 2) [ 11 , 119 , 120 , 121 , 122 , 123 , 124 , 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 , 133 , 134 , 135 , 136 , 137 , 138 , 139 , 140 , 141 , 142 , 143 , 144 , 145 , 146 , 147 , 148 , 149 , 150 , 151 , 152 , 153 , 154 , 155 , 156 , 157 , 158 , 159 , 160 , 161 , 162 , 163 , 164 , 165 , 166 , 167 , 168 , 169 , 170 , 171 , 172 , 173 , 174 , 175 , 176 , 177 , 178 , …”
Section: Main Textmentioning
confidence: 99%
“…This section highlights discusses, compares, summarizes and critiques more than eighty research articles on artificial neural network model's application to the diverse area of the economy. The comparison was made based on (i) author(s)/year of publication (ii) ANN modeling (iii) ANN area of application (iii) studied contribution to human challenges (with references to Supplementary Table 2) [ 11 , 119 , 120 , 121 , 122 , 123 , 124 , 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 , 133 , 134 , 135 , 136 , 137 , 138 , 139 , 140 , 141 , 142 , 143 , 144 , 145 , 146 , 147 , 148 , 149 , 150 , 151 , 152 , 153 , 154 , 155 , 156 , 157 , 158 , 159 , 160 , 161 , 162 , 163 , 164 , 165 , 166 , 167 , 168 , 169 , 170 , 171 , 172 , 173 , 174 , 175 , 176 , 177 , 178 , …”
Section: Main Textmentioning
confidence: 99%
“…In conclusion, the study on Artificial Neural Networks and its methods is promising and ongoing, especially the improvement studies that are needed in learning error side and in the classification accuracy. The improvement of these two categories is a big part for Neural Networks solutions for the new emerging field technologies like Deep Learning in Medicine, Cloud Computing, and even in Information Security [22][23][24][25].…”
Section: Resultsmentioning
confidence: 99%
“…According to the practical application, the visible layer is also called the data input layer, and the hidden layer can be called the feature extraction layer, and the nodes of the two layers are connected by weight parameters. In this network, the RBM of each layer is trained separately [11]. RBM can be regarded as an undirected graph model, which has a visible layer and a hidden layer.…”
Section: Introductionmentioning
confidence: 99%