Computer application under the management of network information security technology using genetic algorithm

被引:6
|
作者
Qiang, Xu Jian [1 ]
机构
[1] Chongqing City Management Coll, Chongqing, Peoples R China
关键词
Information security; Genetic algorithm; Risk assessment; Matrix method; Genetic manipulation;
D O I
10.1007/s00500-022-06813-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the popularization and application of the Internet, information related application technology is constantly infiltrating in the work and life of human beings, playing an unprecedented and increasingly important role. In this paper, in order to completed the application of computer network information security technology management, the author established a security risk quantification model, according to some literature case, determined the operating parameters of genetic algorithm in the specific operation, the data were obtained in the actual system evaluation case, the calculation results using genetic algorithm phase multiplication, matrix method, and proposed the calculation method of risk quantitative model. The final research shows that it is effective and feasible to apply genetic algorithm to network information security technology.
引用
收藏
页码:7871 / 7876
页数:6
相关论文
共 50 条
  • [31] Social network security using genetic algorithm
    MazhariSefat, Benyamin
    Hosseini, Soodeh
    [J]. EVOLVING SYSTEMS, 2023, 14 (02) : 175 - 190
  • [32] The Application of Computer and Network Information Technology in Physical Education
    Lv, Huipeng
    [J]. 2ND INTERNATIONAL CONFERENCE ON SIMULATION AND MODELING METHODOLOGIES, TECHNOLOGIES AND APPLICATIONS (SMTA 2015), 2015, : 877 - 880
  • [33] Development of computer network security management technology based on artificial intelligence under big data
    Xu, Xiuhong
    Liao, Zhongming
    Xu, Zhaosheng
    [J]. WIRELESS NETWORKS, 2023,
  • [34] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [35] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834
  • [36] COMPUTER NETWORK OPTIMIZATION USING GENETIC ALGORITHM
    Akbulut, Olcay
    Osman, Onur
    Ucan, Osman N.
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 245 - 250
  • [37] Application of computer network security technology for electric power system
    Zhu, Enguo
    Wu, Guoliang
    Yang, Gongxun
    [J]. ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 187 - 190
  • [38] The Application of Data Encryption Technology in Computer Network Communication Security
    Liu, Guanxiu
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [39] The Application of Network Anomaly Mining Technology in Campus Network Information Security
    Bin, Wang
    Zhao, Zhi-chao
    Jiang, Yong-cheng
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1793 - 1796
  • [40] The Application of Data Mining Technology in Network Security Management
    Dong Jianfeng
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 145 - 148