Learn More
  • T. He, L. Tong
  • 2006
Malicious use of anonymity techniques makes network attackers difficult to track. The problem is even worse in stepping-stone attacks, where multiple anonymous connections are linked to form an intrusion path. The tracking of a stepping-stone attacker requires the detection of all the connection pairs on the intrusion path. In this paper, we consider the(More)
As is known to all, Back propagation (BP) neural network has two important advantage and disadvantage: learning speed and generalization capability (GC). In this paper, we propose a new method by adding input values function (IVF) to improve the generalization of BP neural network. The result shows: GC in a certain extent has been improved throught this(More)
  • 1