搜索资源列表
snortanalyse
- 轻量级的入侵检测系统snort的源代码分析轻量级的入侵检测系统snort的源代码分析-lightweight snort intrusion detection system source code analysis lightweight snort intrusion detection system the source code analysis
TheAlgorithmofDetectorsGeneratinginIntrusionDetect
- The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory-The Algorithm of Detectors Generating in I ntrusion Detection System Based on Artificial Immune Theory
AgentDIDS
- 本文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,提出了一种基于移动代理的入侵监测系统结构-Based on the intrusion detection technology on the basis of content, Mobile Agent technology will be the introduction of Intrusion Detection System, a Mobile Agent Based Intrusion Detection Sys
ruqinjiancejishu.rar
- 优秀本科毕业论文-有关于入侵检测系统方面的,Outstanding undergraduate thesis- on the intrusion detection systems
BP.IDS
- 基于神经网络的入侵管理系统。在毕业设计中有参考意义。-Network-based Intrusion Detection using Neural Networks 。
DMIDS
- 基于数据挖掘技术的入侵检测系统的设计思路与模型,以及改进思路-Based on Data Mining Intrusion Detection System Design and model, as well as ideas to improve
Snort
- 分析了数据包调用检测函数匹配规则节点的平均次数计算函数,并用该函数对Snort系统规则树进行了优化,减少了数据包过滤匹配次数,极大提高了入侵检测效率-Analysis of packet matching rules called detection function of the average number of nodes the calculation function, and the system function of the Snort rules tree is optimiz
A-hybrid-IDS-design
- 本文使用麻省理工学院林肯实验室的网络流量数据( IDEVAL )作为检测混合入侵检测系统性能的试验数据。混合入侵检测系统获得的结果和的基于误用检测入侵检测系统相比较表明,混合入侵检测系统是一个更强大的系统-In this paper, Massachusetts Institute of Technology Lincoln Laboratory data of network traffic (IDEVAL) as the detection of hybrid intrusion detec
104
- This an intrusion detection code. I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code. I hope this will help people doing work in IDS with secure aodv..
intrusiondetectionbasedonmachinelearning
- 基于机器学习的入侵检测技术研究,机器学习是CS领域中最好玩的分支之一。把它应用到网络安全领域也是很有意思的。-Intrusion detection based on machine learning technology research, the field of machine learning is the CS branch of one of the most fun. And apply it to the field of network security is also ver
research_on_mobile_ad_hod_network_intrusion_detect
- 移动自组织网络入侵检测技术研究 论文-research on mobile ad hod network intrusion detection technology
ZigBe
- 基于ZigBee协议的红外入侵检测系统的设计.pdf 基于ZigBee协议的红外入侵检测系统的设计.pdf-The design of an intrusion detective system on active infrared based on ZigBee
emc78p468programGuide
- The EM78P468N is an 8-bit RISC type microprocessor with high speed CMOS technology and low power consumption. Integrated onto a single chip are on chip watchdog (WDT), Data RAM, ROM, programmable real time clock counter, internal/external interru
IDS
- A Java Based Network Intrusion Detection System (IDS)
Intrusion
- intrusion detection information.in these process used to recover the intrusion system
Process-tracking-method-based-Intrusion-Detection-
- 基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research
referred-paper
- intrusion detection system on immune
ipc$-
- IPC$入侵全解,全名介绍如何利用空连接入侵电脑以及防范-IPC $ invade the whole solution, full name describes how the empty connected computer intrusion and prevention
31-Mining-network-data-for-intrusion-detection-th
- Mining network data for intrusion detection through combining SVM with ant colony
0A-study-on-intrusion-detection-using-neural-netw
- 0A study on intrusion detection using neural networks trained with evolutionary algorithms