Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - ids
Search - ids - List
DL : 0
很好用的语音新片,是IDS公司出品的,我用该电路时感觉输出功率有点小。-good movie with the voice of the producer of the IDS, I used to the circuit output feeling a bit small.
Date : 2026-01-12 Size : 354kb User : 王衷曲

DL : 0
一款轻量级的入侵检测系统 对于网页中的shellcode有一定的防范能力-A lightweight Intrusion Detection System for pages Shellcode has a certain capacity to prevent
Date : 2026-01-12 Size : 89kb User : 谢黎鹏

DL : 0
Snort作为一个轻量级的网络入侵检测系统,在实际中应用可能会有些力不从心,但如果想了解研究IDS的工作原理,仔细研究一下它的源码到是非常不错.首先对snort做一个概括的评论-Snort as a lightweight network intrusion detection system, in practice the application may be unable to, but if you want to understand the working principle of IDS research, look at its source to be very good. First snort a general Comments
Date : 2026-01-12 Size : 128kb User : 文莎

DL : 0
关于入侵检测的简介 介绍了网络入侵检测的应用 主要是免疫选择方面的-Briefing on the IDS introduced the application of network intrusion detection is immune selection of
Date : 2026-01-12 Size : 12kb User : 王佳妮

DL : 0
Integrate and Embedd Barcodes in Visual Basic 6 Project. If you want to generate Barcodes of IDs in your project, this can help you.
Date : 2026-01-12 Size : 151kb User : Muhammad Siddique

DL : 0
来源:http://cctf.shmoo.com/data/cctf-defcon8/(可以自己下载更多数据) 真实的网络数据,可以用来评测IDS性能。-Source: http://cctf.shmoo.com/data/cctf-defcon8/ (you can download more data on their own) the real network data can be used to evaluation performance of IDS.
Date : 2026-01-12 Size : 36.26mb User : 齐慧玲

DL : 0
Ask the user for two filenames. The first filename specifies the input file and the second filename specifies the output file. You can assume the filenames do not contain any whitespace characters. Your objective is to sort all the triangles represented in the input file in ascending order based on their area sizes and output the sorted list of triangles to the output file following the same file format. Among all the triangles with the same area size, sort them in ascending order according to their IDs. You must use Triangle objects in your program to represent the triangles you read from the file. If your program fails to open a file, it should display an error message and terminate immediately. -Ask the user for two filenames. The first filename specifies the input file and the second filename specifies the output file. You can assume the filenames do not contain any whitespace characters. Your objective is to sort all the triangles represented in the input file in ascending order based on their area sizes and output the sorted list of triangles to the output file following the same file format. Among all the triangles with the same area size, sort them in ascending order according to their IDs. You must use Triangle objects in your program to represent the triangles you read from the file. If your program fails to open a file, it should display an error message and terminate immediately.
Date : 2026-01-12 Size : 1kb User : alan

DL : 0
IDS Intrusion Detection System
Date : 2026-01-12 Size : 1.77mb User : svelu

DL : 0
很多IDS,IPS等签名研发者,在不断开发新签名的同时,需要化大量时间去测试签名的有效性,以前一直在手工测试,于是想有没有工具能批量实现签名检测,于是有了这个程序.-Many IDS, IPS signatures and other developers, are constantly developing new signature at the same time, require the signature of a lot of time to test the validity of the test had previously been in the manual, so there is no tool like Batch signature detection, so with this program .
Date : 2026-01-12 Size : 1kb User : freebuf

Electronic Security, hardware firewall, IPS IDS
Date : 2026-01-12 Size : 560kb User : jailbird01

DL : 0
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network
Date : 2026-01-12 Size : 951kb User : mohammad.b

DL : 0
API for query all info about process: command line, IDs, session number, cpu and memory consumption etc.
Date : 2026-01-12 Size : 9kb User : Alexander

DL : 0
SBR this ids a file with e-books
Date : 2026-01-12 Size : 82kb User : haga

DL : 0
一个用perl实现的简易的入侵检测系统,能够实现在linux或windows平台下的的入侵检测,如arp欺骗,洪泛攻击等(A simple intrusion detection system implemented with Perl, which can achieve intrusion detection in Linux or windows platform, such as ARP spoofing, flooding attacks and so on)
Date : 2026-01-12 Size : 276kb User : liuxiangs

DL : 0
A simple extension for Chrome to search on Walmart for item IDs against multiple areas based on Zip codes.
Date : 2026-01-12 Size : 291kb User : magnum_2007

KDD DATASET POUR USAGE POUR LES CHERCHEURS EN IDS A UTILISER
Date : 2026-01-12 Size : 335kb User : abdelkaderm1000

DL : 0
KDD SET POUR UTILISATION POUR AMELIORER LES PERFORMANCE DES IDS
Date : 2026-01-12 Size : 1.59mb User : abdelkaderm1000

DL : 0
NSL KDDSET UNE VERSION REDUITE DU KDD CUP 99 A UTISER POUR IDS
Date : 2026-01-12 Size : 293kb User : abdelkaderm1000

this is matlab based IDS data processor, KDDPreprocessor
Date : 2026-01-12 Size : 2kb User : gungun123

intrusion detection system
Date : 2026-01-12 Size : 10kb User : tinly
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.