搜索资源列表
FuzzyIntrusionDetectionSystemviaDataMining
- There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applia