搜索资源列表
snortanalyse
- 轻量级的入侵检测系统snort的源代码分析轻量级的入侵检测系统snort的源代码分析-lightweight snort intrusion detection system source code analysis lightweight snort intrusion detection system the source code analysis
TheAlgorithmofDetectorsGeneratinginIntrusionDetect
- The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory-The Algorithm of Detectors Generating in I ntrusion Detection System Based on Artificial Immune Theory
baseAgent
- 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a
AgentDIDS
- 本文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,提出了一种基于移动代理的入侵监测系统结构-Based on the intrusion detection technology on the basis of content, Mobile Agent technology will be the introduction of Intrusion Detection System, a Mobile Agent Based Intrusion Detection Sys
IDS111223
- 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
ruqinjiancejishu.rar
- 优秀本科毕业论文-有关于入侵检测系统方面的,Outstanding undergraduate thesis- on the intrusion detection systems
BP.IDS
- 基于神经网络的入侵管理系统。在毕业设计中有参考意义。-Network-based Intrusion Detection using Neural Networks 。
invasiondection
- 基于协议分析的入侵检测论文资料 欢迎下载阅读-Protocol based on the analysis of intrusion detection information welcome to download read the thesis
DMIDS
- 基于数据挖掘技术的入侵检测系统的设计思路与模型,以及改进思路-Based on Data Mining Intrusion Detection System Design and model, as well as ideas to improve
Snort
- 分析了数据包调用检测函数匹配规则节点的平均次数计算函数,并用该函数对Snort系统规则树进行了优化,减少了数据包过滤匹配次数,极大提高了入侵检测效率-Analysis of packet matching rules called detection function of the average number of nodes the calculation function, and the system function of the Snort rules tree is optimiz
A-hybrid-IDS-design
- 本文使用麻省理工学院林肯实验室的网络流量数据( IDEVAL )作为检测混合入侵检测系统性能的试验数据。混合入侵检测系统获得的结果和的基于误用检测入侵检测系统相比较表明,混合入侵检测系统是一个更强大的系统-In this paper, Massachusetts Institute of Technology Lincoln Laboratory data of network traffic (IDEVAL) as the detection of hybrid intrusion detec
104
- This an intrusion detection code. I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code. I hope this will help people doing work in IDS with secure aodv..
intrusiondetectionbasedonmachinelearning
- 基于机器学习的入侵检测技术研究,机器学习是CS领域中最好玩的分支之一。把它应用到网络安全领域也是很有意思的。-Intrusion detection based on machine learning technology research, the field of machine learning is the CS branch of one of the most fun. And apply it to the field of network security is also ver
IDS
- A Java Based Network Intrusion Detection System (IDS)
Intrusion
- intrusion detection information.in these process used to recover the intrusion system
Process-tracking-method-based-Intrusion-Detection-
- 基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research
Snort-tool-for-Intrusion-Detection
- 通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理-Introduce the common snort intrusion detection tool configuration, the basic application and rules written in simple intrusion detection features, easy to understand the basic principles of in
Adaptation-Techniques-for-Intrusion-Detection
- This paper examines techniques for providing adaptation in intrusion detection and intrusion response systems
31-Mining-network-data-for-intrusion-detection-th
- Mining network data for intrusion detection through combining SVM with ant colony
0A-study-on-intrusion-detection-using-neural-netw
- 0A study on intrusion detection using neural networks trained with evolutionary algorithms