搜索资源列表
Delaunay
- 使用著名的Delaunay算法实现平面三角化。鼠标任意点击可增加、插入节点、形成网格;对节点标号,可逐步观查网格的变化,体验Delaunay算法过程。内有程序结构的详细说明,易于理解和移植。-2D-triangularization is realised based on the famous Delaunay algorithm in this program. While clicking the left mouse button, new nods with IDs are adde
Barcodes
- Integrate and Embedd Barcodes in Visual Basic 6 Project. If you want to generate Barcodes of IDs in your project, this can help you.
Prius_CAN_Codes
- CAN traffic IDs and meanings on car Prius in non-solicited mode
ShellCode
- 1、获取特殊权限 2、执行/bin/sh 3、绑定到端口。 4、反向连接。 5、躲避IDS的过滤 -1, to obtain special permission 2, the implementation of/bin/sh 3, bound to the port. 4, reverse connection. 5, to avoid filtering IDS
reducingdemension
- 网络入侵检测降维算法。它的作用是把捕获的数据进行分析,输出有用的信息。-the algorithm about reducing demension in analysing the data for ids.
28153903
- 来源:http://cctf.shmoo.com/data/cctf-defcon8/(可以自己下载更多数据) 真实的网络数据,可以用来评测IDS性能。-Source: http://cctf.shmoo.com/data/cctf-defcon8/ (you can download more data on their own) the real network data can be used to evaluation performance of IDS.
Triangle
- Ask the user for two filenames. The first filename specifies the input file and the second filename specifies the output file. You can assume the filenames do not contain any whitespace characters. Your objective is to sort all the triangles rep
base-1.4.5.tar
- Basic Analysis and Security Engine (BASE): BASE是一个用来查看Snort IDS告警的Web应用程序。-Basic Analysis and Security Engine (BASE): BASE is a Snort IDS is used to view the alarms of the Web application.
snort-2.8.5.3.tar
- snort轻量级网路入侵检测系统的源代码,是一款非常强大的NIDS工具。-lightweight network intrusion detection system snort source code, is a very powerful tool for NIDS.
ActiveX
- Embedding ActiveX controls by their IDs.
SnortIDS
- 基于snort网络入侵检测系统IDS基于Linux网络入侵检测系统-snort
snort-sort
- 入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whe
anids
- linux下的IDS源码,编辑比较自由,可以根据自己的需要增加规则-IDS under linux source code, edit more freely, according to their need for additional rules
lidstools-2.2.7.2.tar
- Linux下的Ids系统 功能比较简单 适合初学者-Ids system functions under Linux is simple for beginners
FuzzyIntrusionDetectionSystemviaDataMining
- There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applia
ids
- intrusion detection pdf file
Main11
- 孤立点挖掘算法,入侵检测中使用到的孤立点算法的java代码实现-outlier_miner in IDS
Recognition_of_hackers
- The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In
StMichael_LKM-0.13-k2.6.tar
- The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. A crucial part of Saint Jude is Saint Michael, responsible for protecting the kernel itself from attacks.
StMichael_LKM-0.13.tar
- The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. This is Saint Michael for 2.4 kernels.