搜索资源列表
DistributedIntrusionDetection
- Distributed Intrusion Detection for network
research_on_mobile_ad_hod_network_intrusion_detect
- 移动自组织网络入侵检测技术研究 论文-research on mobile ad hod network intrusion detection technology
moshipipeiIDS
- 基于模式匹配的Windows主机入侵检测系统研究.-Based on pattern matching Windows Host Intrusion Detection System.
moshipipeizaiwangluoruqingjiancexitongyingyong
- 本文是网络入侵检测中模式匹配算法的研究,文件需caj打开-This is a network intrusion detection pattern matching algorithm, the file be opened caj
Snort
- Snort 入侵检测实用解决方案(中文)-Snort Intrusion Detection practical solutions
UsingDataMiningTechniquesforDetectingTerrorRelate
- An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior of terrorists by applying a data mining algorithm to the te
ZigBe
- 基于ZigBee协议的红外入侵检测系统的设计.pdf 基于ZigBee协议的红外入侵检测系统的设计.pdf-The design of an intrusion detective system on active infrared based on ZigBee
emc78p468programGuide
- The EM78P468N is an 8-bit RISC type microprocessor with high speed CMOS technology and low power consumption. Integrated onto a single chip are on chip watchdog (WDT), Data RAM, ROM, programmable real time clock counter, internal/external interru
UnsupervisedAnomalyDetectionBasedOnPrincipalCompon
- 入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process
UsingGAforNetworkIntrusionDetection
- Using GA for Network Intrusion Detection
project
- Additionally, the access point may connect to a costly resource (e.g., a satellite link), or an external network that is susceptible to intrusion. For such reasons and others that concern data availability and response time, MANET applications sho
referred-paper
- intrusion detection system on immune
IDS
- 入侵检测与防御PPT课件,以及实验指导书、考试复习资料。-Intrusion detection and defense PPT courseware, and experiments instruction, examination review material.
01714200
- K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection
Wireless-network-intrusion-trip
- 本文档教你如何一步 利用无线网漏洞来破解密码-This document to teach you step by step how to use the wireless network vulnerabilities to crack passwords
full-docu1
- .net project for intrusion detection
ipc$-
- IPC$入侵全解,全名介绍如何利用空连接入侵电脑以及防范-IPC $ invade the whole solution, full name describes how the empty connected computer intrusion and prevention
hongbingdu
- 网络对抗课程实验,宏病毒的入侵和检测,包括截图及说明-Network the confrontation course experiments, intrusion and detection of macro viruses, including screenshots and instructions
wangluoduikang
- 网络对抗实验,控制台下的局域网电脑入侵及木马植入实验-LAN network confrontation experiments under the console computer intrusion and Trojans implantation experiments
Snort
- snort入侵检测系统中文手册,对于snort的安装配置进行来详细的讲解-snort intrusion detection system Chinese manual for the snort installation and configuration detail explain