{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:43:23Z","timestamp":1777704203081,"version":"3.51.4"},"reference-count":11,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p>This study aims to use neural network theory to analyze and evaluate computer network security. Firstly, the evaluation model of computer network security was given based on relevant literature, and the corresponding index system was constructed, including 19 indicators of management security, physical security, and logical security. Then, the index normalization standard was proposed and the index security level was set. Finally, computer network security was evaluated according to the neural network. Results show that security management strategy has the greatest impact on computer network security, followed by routing control and data encryption.<\/jats:p>","DOI":"10.3233\/jifs-169643","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T13:10:48Z","timestamp":1529068248000},"page":"2887-2891","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["Intelligent evaluation of computer network security based on neural network"],"prefix":"10.1177","volume":"35","author":[{"given":"Longge","family":"Wang","sequence":"first","affiliation":[{"name":"School of Software, Henan University, Kaifeng, China"},{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Junyang","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng, China"},{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Baojun","family":"Qiao","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng, China"}]}],"member":"179","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"168","article-title":"Power grid security assessment combining AHP with neuralnetwork","volume":"21","author":"Huaxin Z.","year":"2016","unstructured":"HuaxinZ., Power grid security assessment combining AHP with neuralnetwork, Modern Electronics Technique21 (2016), 168\u2013171.","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_3_2","first-page":"147","article-title":"Evaluation of network security situation based on grey relational analysis and support vector machine","volume":"4","author":"Yan S.","year":"2015","unstructured":"YanS., Evaluation of network security situation based on grey relational analysis and support vector machine, Laser Journal4 (2015), 147\u2013150.","journal-title":"Laser Journal"},{"key":"e_1_3_2_4_2","first-page":"2622","article-title":"Improved network security situational assessment method based on FAHP","volume":"9","author":"Fanglei L.","year":"2014","unstructured":"FangleiL., ShaochengY. and JiangZ., Improved network security situational assessment method based on FAHP, Journal of Computer Applications9 (2014), 2622\u20132626.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_5_2","first-page":"89","article-title":"Computer network security evaluation simulation model based on neural network","volume":"3","author":"Siting W.","year":"2017","unstructured":"SitingW. and BiaoW., Computer network security evaluation simulation model based on neural network, Modern Electronics Technique3 (2017), 89\u201391.","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_6_2","first-page":"126","article-title":"Application research of computer network securityevaluation based on network security","volume":"11","author":"Renjie W.","year":"2011","unstructured":"RenjieW., Application research of computer network securityevaluation based on network security, Computer Simulation11 (2011), 126\u2013128.","journal-title":"Computer Simulation"},{"key":"e_1_3_2_7_2","first-page":"99","article-title":"Network security assessment model of coupling empowerment","volume":"22","author":"Huaxi C.","year":"2011","unstructured":"HuaxiC., YuoqiangG. and BaofengY., Network security assessment model of coupling empowerment, Computer Engineering22 (2011), 99\u2013101.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_8_2","first-page":"92","article-title":"Research on security grade classification of computer network based on discrete Hopfield network","volume":"21","author":"Zhifeng H.","year":"2015","unstructured":"ZhifengH., Research on security grade classification of computer network based on discrete Hopfield network, Modern Electronics Technique21 (2015), 92\u201395.","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_9_2","first-page":"85","article-title":"Evaluation of computer network security based on adaptive BP neural network","volume":"23","author":"Jun Z.","year":"2015","unstructured":"JunZ., Evaluation of computer network security based on adaptive BP neural network, Modern Electronics Technique23 (2015), 85\u201388.","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_10_2","first-page":"89","article-title":"Study on computer network security evaluation based onsupport vector regression machine","volume":"7","author":"Ye S.","year":"2016","unstructured":"YeS., Study on computer network security evaluation based onsupport vector regression machine, Modern Electronics Technique7 (2016), 89\u201392.","journal-title":"Modern Electronics Technique"},{"key":"e_1_3_2_11_2","first-page":"1750","article-title":"Network security situation awareness based on neural networks","volume":"12","author":"Lixia X.","year":"2013","unstructured":"LixiaX., YachaoW. and JinboY., Network security situation awareness based on neural networks, Journal of Tsinghua University (Science and Technology)12 (2013), 1750\u20131760.","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"e_1_3_2_12_2","unstructured":"LinoA. Rocha\u00c1. and SizoA. Virtual teaching and learningenvironments: Automatic evaluation with artificial neural networks luster Computing (2017) 1\u201311."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169643","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169643","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:41Z","timestamp":1777455641000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.3233\/JIFS-169643"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169643","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,14]]}}}