搜索资源列表
IS
- 关于入侵检测技术介绍和学习 -Intrusion detection software
Snort
- Snort是一个以开放源代码形式发行的一个功能强大、跨平台、轻量级的网络入侵检测系统,本文详细介绍了snort的安装过程及配置使用-Snort is an open source issued a powerful, cross-platform, lightweight network intrusion detection system, the paper describes the the snort installation process and the configuration
Snort-book
- Snort轻量级入侵检测系统全攻略 的书,详细描述了snort的IDS-Snort lightweight intrusion detection systems Raiders book describes in detail the snort IDS
PC
- 从电脑初学者的角度来讲解黑客入侵的基本原理与观念,IP的隐藏和研究,一般电脑的入侵和修补技术-From the point of view of computer beginners to explain the basic principles and concepts of hacking, IP s hide and research, general computer intrusion and repair technology
11212016
- Intrusion Dtetection System using Honeypots
Applying-Fast-String-Matching-to-Intrusion-Detect
- applying fast string matching to intrustion detection-applying fast string matching to intrustion detection
BJ8P508/153 8-BIT MICRO-CONTROLLER
- BJ8P508/153 is an 8-bit microprocessor with low-power and high-speed CMOS technology. It is equipped with a 1024*13-bits Electrical One Time Programmable Read Only Memory (OTP-ROM) with it. It provides a PROTECTION bit to prevent intrusion of user’s
111
- 聚类优化算法。 kohonen网络的聚类算法—网络入侵聚类-Clustering optimization algorithms. kohonen network clustering algorithm- Network Intrusion Clustering
security--structure--migrate-to-vm
- 传统安全系统结构能否移植到虚拟机平台,虚拟机中移植传统网络入侵检测系统存在的问题分析,虚拟机中移植传统网络入侵检测系统可行性分析,虚拟机中移植传统网络入侵检测系统实现。-Traditional security system structure can migrate to a virtual machine platform, virtual machine migration traditional network intrusion detection system problem ana
107
- 杨凡-107课-从0开始学习入侵网站学习资料-Yang Fan-107 lesson- learning from zero intrusion learning materials website
cross
- A Cross-layer based Intrusion Detection Approach for Wireless Ad hoc Networks its the best because its not fr-A Cross-layer based Intrusion Detection Approach for Wireless Ad hoc Networks its the best because its not free
ebook-NIDS
- Network Intrusion Detection e book
Errack
- SECURE INTRUSION-DETECTIONSYSTEM FOR MANETS Abstract: Our goal is to detect malicious nodes by proposing a new IDS specially designed for MANETs ,which aims to solve receiver collision limited transmission power false misbehavior proble
3
- Intrusion detaction based on machion learning
IDS1-(1)
- Network intrusion detection system
9106135daebe6fef341105006ea3826d
- a comparative performance uation paper on intrusion detection system for wireless sensor networks-a comparative performance uation paper on intrusion detection system for wireless sensor networks
ids
- 关于入侵检测系统概述的研究论文,和大家分享-this is an paper about Intrusion Detection System
Thesis_electronic_submit
- HybrIDS: EMBEDDABLE HYBRID INTRUSION DETECTION SYSTEM
SPIEDSS05
- A Clustering Algorithm for Intrusion Detection
iec
- Designing Intrusion Detection Systems: Architectures, Challenges and Perspectives