搜索资源列表
baseAgent
- 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a
IDS111223
- 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
DistributedIntrusionDetection
- Distributed Intrusion Detection for network
UsingDataMiningTechniquesforDetectingTerrorRelate
- An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior of terrorists by applying a data mining algorithm to the te
UsingGAforNetworkIntrusionDetection
- Using GA for Network Intrusion Detection
01714200
- K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection
Snort-tool-for-Intrusion-Detection
- 通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理-Introduce the common snort intrusion detection tool configuration, the basic application and rules written in simple intrusion detection features, easy to understand the basic principles of in
cross
- A Cross-layer based Intrusion Detection Approach for Wireless Ad hoc Networks its the best because its not fr-A Cross-layer based Intrusion Detection Approach for Wireless Ad hoc Networks its the best because its not free
ebook-NIDS
- Network Intrusion Detection e book
3
- Intrusion detaction based on machion learning
IDS1-(1)
- Network intrusion detection system
ids
- 关于入侵检测系统概述的研究论文,和大家分享-this is an paper about Intrusion Detection System
iec
- Designing Intrusion Detection Systems: Architectures, Challenges and Perspectives