搜索资源列表
Kohonen
- matlab,网络入侵算法,适用于网络入侵将计算与仿真,希望有助于大家分析-Matlab, network intrusion algorithm, is suitable for the network intrusion will calculation and simulation, hope to help everyone
SKohonen
- matlab,网络入侵算法2,适用于网络入侵将计算与仿真,希望有助于大家分析-Matlab, network intrusion algorithm 2, suitable for network intrusion will calculation and simulation, hope to help everyone
Dshell-master
- 一个可扩展网络入侵分析框架。可快速开发支持插件。具备可靠的流重组,支持 ipv4 和 ipv6.-An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features: Robust stream reassembly IPv4 and
guangyishenjing
- 广义神经网络的聚类算法-网络入侵聚类,这个程序特别好使-Clustering algorithm of generalized neural network- Network Intrusion clustering, the program is particularly good
kohonen
- kohonen网络的聚类算法—网络入侵聚类-Clustering algorithm kohonen Network- Network intrusion Clustering
FCMGRNN
- 广义神经网络的聚类算法 网络入侵聚类分析说明-Generalized neural network clustering algorithm Network Intrusion clustering
kohonen
- kohonen网络的聚类算法—网络入侵聚类-Clustering algorithm kohonen Network- Network intrusion Clustering
NICA
- 在matlab实现 网络入侵聚类算法 很好用的东西-In the matlab network intrusion clustering algorithm Useful things
Kohonen-Network
- 基于Kohonen网络的聚类算法——网络入侵聚类-Clustering Algorithm Based on Kohonen Network- Network Intrusion Clustering
NSL-KDD
- 这是KDD数据的改进版。进行网络入侵检测的研究生人员可以下载。-This is an improvement of the KDD data. And, if you are interested in the intrusion detection, you can download this data file freely.
IWO_Kohonen
- 基于杂草算法Kohonen网络入侵检测 -Weeds algorithm based on Kohonen network intrusion detection
Kohonen
- 基于Kohonen网络的聚类算法—网络入侵聚类-Clustering algorithm based on Kohonen network- network intrusion clustering
kohonen
- 对于大数据学习的同学,本案例具有非常好的引领作用,特别适合初学者!非常实用!该案例为网络聚类算法,适合研究网络入侵聚类。-For large data learning of students, this case has a very good leading role, is particularly suitable for beginners! Very practical! The case for the network clustering algorithm, is suitab
Multi-Agent-Based-IDS-for-WSN
- 本文提出一种无线传感器网络入侵检测解决方案针对分簇式无线传感器网络的特点, 通过让节点和簇头分别执行不同检测任务, 结合本地检测和联合检测, 并采用多个代理模块分别实现数据收集、分析检测和入侵响应和代理管理的任务,是一套完整的IDS体系。-This paper proposes a wireless sensor network intrusion detection characteristics solutions cluster wireless sensor network, data
A-survey-of-IDS
- 无线传感器网络入侵检测系统的综述,对多种入侵检测方法进行了描述-Review of wireless sensor network intrusion detection system, the plurality of intrusion detection methods are described
KDD99
- KDDCUP99数据集解析说明,可以用来做网络入侵检测系统的分析验证-KDDCUP99 described parsing data set can be used for analysis to verify network intrusion detection system
40283063
- ACID入侵检测分析台可提供图形用户界面以及()
基于PACKETX的网络数据包捕获与分析
- 在Visual Basic平台,采用Packetx控件,完成网络数据包捕获。借助Visual Basic丰富的界面元素和运算功能,分析获取的数据包,经过统计得到数据包流量及规律,从而实现流量监控、底层入侵检测,发现网络异常情况,采取相应的处理措施
coolfire基础
- 这只是告诉如何破解系统, 好能够将自己的系统作安全的保护, 如果你能够将这份文件完全看完, 你就能够知道电脑骇客们是如何入侵你的电脑,。CoolFire写这篇文章的目的是要让大家明白电脑安全的重要性。(t's just about how to break the system and protect your system. If you can finish reading the document, you will know how the computer hackers invade
uskt
- 入侵检测数据检测算法,根据C4 5源码改编()