Security software using neural networks

被引:0
|
作者
Zimmer, JP [1 ]
Miteran, J [1 ]
Yang, F [1 ]
Paindavoine, M [1 ]
机构
[1] Univ Bourgogne, F-21011 Dijon, France
来源
IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4 | 1998年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the structure and the theoretical principles of the security software that we developed. This sofware is an industrial application based on the neural networks theory that we describe hereafter. Its aim is to recognize somebody's face and thus to add one more protecting level to the Windows NT and Windows 95 security access. We implemented the face learning phase by using the projection onto eigenvectors matrix and the backpropagation algorithm. We stored in a database, the identification of the faces which have been learned and we added a security protection when opening the personal session of the operating system Windows NT and we created a new level of protection for Windows 95. We tested our algorithms on images of other types than faces and the results allow to use the software in industrial control.
引用
收藏
页码:72 / 74
页数:3
相关论文
共 50 条
  • [21] Dynamic security margin estimation using artificial neural networks
    Sittithumwat, A
    Tomsovic, K
    2002 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 1322 - 1327
  • [22] Formal Security Analysis of Neural Networks using Symbolic Intervals
    Wang, Shiqi
    Pei, Kexin
    Whitehouse, Justin
    Yang, Junfeng
    Jana, Suman
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1599 - 1614
  • [23] Matching Attack Patterns to Security Patterns Using Neural Networks
    Adebiyi, Adetunji
    Arreymbi, Johnnes
    Imafidon, Chris
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 9 - 17
  • [24] Estimation of software defects fix effort using neural networks
    Zeng, H
    Rine, D
    PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 20 - 21
  • [25] Algorithm Selection for Software Verification Using Graph Neural Networks
    Leeson, Will
    Dwyer, Matthew B.
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (03)
  • [26] A software sensor using neural networks for detection of patient workload
    Andersson, JL
    Hedberg, SE
    Hirschberg, J
    Schuller, H
    PACE-PACING AND CLINICAL ELECTROPHYSIOLOGY, 1998, 21 (11): : 2204 - 2208
  • [27] A Conceptual Framework for Software Fault Prediction Using Neural Networks
    Serban, Camelia
    Bota, Florentin
    MODELLING AND DEVELOPMENT OF INTELLIGENT SYSTEMS, MDIS 2019, 2020, 1126 : 171 - 186
  • [28] Severity prediction of software vulnerabilities using convolutional neural networks
    Saklani, Santosh
    Kalia, Anshul
    INFORMATION AND COMPUTER SECURITY, 2025,
  • [29] Software Vulnerability Detection Using Deep Neural Networks: A Survey
    Lin, Guanjun
    Wen, Sheng
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    PROCEEDINGS OF THE IEEE, 2020, 108 (10) : 1825 - 1848
  • [30] Quality evaluation of aerospace software using parallel neural networks
    Song Y.
    Shen X.
    Li H.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2020, 41 (04): : 595 - 600