搜索资源列表
contiki-2.2.2
- Contiki是一个开源,高度便携性,多任务操作系统内存效率的网络化嵌入式系统和无线传感器网络。 Contiki是采用了不同的项目,如公路隧道火灾监测,入侵检测,水质监测在波罗的海,并在监测网络。 Contiki是专为微控制器与少量的记忆。一个典型的Contiki配置2千字节的RAM和40千字节的ROM 。-contiki distributed OS。 Contiki is an open source, highly portable, multi-tasking operatin
Network-Intrusion-Detection-System
- linux环境下运行的,以c语言编程的入侵检测系统-running under the linux environment, intrusion detection system to the c programming language
Hacker-intrusion-detection-system
- 本文的目的就是对人工神经网络进行适当的改进,将其应用于网络黑客入侵检测系统中,以提高系统的效率,包括检测速度的提高、减少漏报率和误报率-The purpose of this paper is the appropriate improvement of artificial neural networks, intrusion detection system applied to hackers in order to improve the efficiency of the system
Intrusion-Detection
- The problem of intrusion detection has been studied and received a lot of attention in machine learning and data mining in the literature survey. The existing techniques are not effective to improve the classification accuracy and to reduce high
Intrusion-Detection-System-over-Abnormal-Internet
- Intrusion Detection System over Abnormal Internet Sequence
Snort-tool-for-Intrusion-Detection
- 通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理-Introduce the common snort intrusion detection tool configuration, the basic application and rules written in simple intrusion detection features, easy to understand the basic principles of in
opencv-based-intrusion-detection
- 这是一个基于opencv入侵检测,跟踪目标,显示每帧入侵物的数量,并发出报警-This is a opencv-based intrusion detection, target tracking, display each frame invaders number, and alarm
Network-intrusion-detection
- 入侵检测的核心技术就是从网络中获取信息,对获取的信息进行分析来进一步判定是否是发生了入侵。 -The core technology of intrusion detection is to obtain information from the network, further analysis of the information obtained to determine whether the invasion occurred.
intrusion-detection-matlab
- intrusion detection algorithm in matlab
intrusion-detection
- 入侵检测系统,可以检测各种入侵行为,还可以检测出入侵者的信息如:源IP,端口号,入侵类型等。-Intrusion Detection
Adaptation-Techniques-for-Intrusion-Detection
- This paper examines techniques for providing adaptation in intrusion detection and intrusion response systems
Intrusion-Detection-System-Using-Wireshark
- Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station
A-HoneyPot-Network-Intrusion-Detection-System
- A HoneyPot Network Intrusion Detection System Descr iption: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes p
31-Mining-network-data-for-intrusion-detection-th
- Mining network data for intrusion detection through combining SVM with ant colony
0A-study-on-intrusion-detection-using-neural-netw
- 0A study on intrusion detection using neural networks trained with evolutionary algorithms
nsa
- Intrusion detection based on immune system
IDS
- In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old technics such as firewalls, authentication and encryption could not provide Internet secur
Hybrid-Intrusion-Detection-System-master
- hybrid intrusion detection system
Intrusion-Detection-System-master
- network intrusion detection system
kdd99 Intrusion detection
- 基于kmeans的异常检测算法,数据集是kddcup99(Based on kmeans anomaly detection algorithm, the data set is kddcup99.)