Information security of hospital computer network based on SAE deep neural network

被引:1
|
作者
Li G. [1 ]
Dong Z. [2 ]
Wang Y. [3 ]
机构
[1] Gansu Provincial Hospital of Traditional Chinese Medicine, Information Section, Lanzhou
[2] Gansu Provincial Central Hospital, Department of Gastroenterology, Lanzhou
[3] Affiliated Hospital of Gansu University of Traditional Chinese Medicine, Information Section, Lanzhou
关键词
Deep learning; Hospital networks; Information security; Risk assessment; SAE networks;
D O I
10.2478/amns.2023.1.00466
中图分类号
学科分类号
摘要
As the pace of hospital informatization construction continues to accelerate, information network technologies are being used more and more extensively in the medical industry. These advanced technologies make medical businesses more and more dependent on industry information and data, which brings about network system security issues that cannot be ignored. To strengthen the daily operation and management of hospitals, ensure the stable operation of computer systems, and do a good job in protecting the security of hospital computer system network information, this paper designs a risk assessment method for hospital computer network information security based on SAE deep neural network and analyzes the main factors affecting the security of hospital computer system network information. The experimental results prove that the proposed method can effectively improve the reliability of the evaluation results and ensure the accuracy of the evaluation results. According to the obtained information security model, it can effectively guide the construction and application of hospital computer network information systems, optimize the system network, and promote the development of hospital informatization. © 2023 Guizhen Li et al.;published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [31] Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
    Ruchkin, V. N.
    Kostrov, B. V.
    Fulin, V. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 970 - 980
  • [32] GABP Neural Network Algorithm Applied in Evaluation of Computer Network Security
    He, Xiaochun
    Feng, JunJun
    Jia, Ruchun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 377 - 387
  • [33] Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
    V. N. Ruchkin
    B. V. Kostrov
    V. A. Fulin
    Automatic Control and Computer Sciences, 2022, 56 : 970 - 980
  • [34] Security Evaluation Methods of Computer Networks Based on BP Neural Network
    Li, Liping
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1191 - 1196
  • [35] Discussion and Practice of Computer Network Information and Network Security Protection Strategy
    Liu, Li
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1810 - 1813
  • [36] Research on computer network information security based on improved machine learning
    Yu Guangxu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (04) : 6889 - 6900
  • [37] Research on Computer Network Information Security Based on Big Data Technology
    Xiao, Gengyi
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 325 - 329
  • [38] Information Security and Future Trend Analysis Based on Computer Network Environment
    Jin, Haoyuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT, EDUCATION, HUMANITIES AND SOCIAL SCIENCES (EMEHSS 2018), 2018, 151 : 6 - 9
  • [39] Parallel Deep Neural Network for Detecting Computer Attacks in Information Telecommunication Systems
    Dorosh, Vitaliy
    Sachenko, Anatoliy
    Komar, Myroslav
    Golovko, Vladimir
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON ELECTRONICS AND NANOTECHNOLOGY (ELNANO), 2018, : 675 - 679
  • [40] An approach to network security evaluation of computer network information system with triangular fuzzy information
    Guo, Jin-cheng
    Fan, Dan
    Che, Hao-yuan
    Duan, Yun-na
    Wang, Hong-Su
    Zhang, Da-Wei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2029 - 2035