Research Article
Development of Network Security Based on the Neural Network PSD Algorithm
Table 5
Evaluation results of D-S, Elman, GA-Elman, and DS-GA-Elman.
| Samples | D-S | Elman | GA-Elman | DS-GA-Elman | Desired security level |
| 4 | VI | IV | IV | V | IV | 15 | III | III | III | III | III | 26 | III | II | III | III | III | 42 | III | II | II | II | II | 65 | III | II | III | III | III | 74 | IV | III | II | III | III | 81 | IV | IV | IV | IV | IV | 98 | V | V | IV | IV | V | 88 | V | IV | V | V | V | 93 | V | IV | V | IV | IV |
|
|