Welcome![Sign In][Sign Up]
Location:
Search - intrusion detection

Search list

[OtherEasyCamImperial.ZIP

Description: 集合物体形状/颜色识别功能的全自动安全监视报警器,可以用来检测特定物体是否被移动、或者用于入侵检测等等 -shape/color recognition function of automatic security alarm monitoring device that can be used to determine whether a particular object was moving, or for intrusion detection, etc.
Platform: | Size: 220160 | Author: 姚紫欣 | Hits:

[Firewall-SecurityDNASetup

Description: Deep Network Analyzer(DNA)是一个灵活的,可扩展的深度网络分析器(服务器软件)与框架,它可收集和分析网络数据包,网络对话(sessions)与应用层协议(HTTP,DNS,P2P,VoIP等),被动地隔离企业级网络.DNA主要设计用于Internet安全,入侵探测,网络管理,协议与网络分析,信息搜集,网络监测应用程序.-Deep Network Analyzer (DNA) is a flexible, Depth can be extended network analyzer (server software) and the framework, which will collect and analyze data packet network, Network Dialogue (sessions) and the application layer protocol (HTTP, DNS, P2P, VoIP, etc.), passive isolation enterprise network. DNA designed mainly for Internet security, Intrusion detection, network management, network agreement with the analysis, information gathering, network monitoring applications.
Platform: | Size: 12617728 | Author: 秦宗全 | Hits:

[ApplicationsIntrusion-Detection-System-over-Abnormal-Internet

Description: Intrusion Detection System over Abnormal Internet Sequence
Platform: | Size: 3507200 | Author: sachin | Hits:

[Industry researchSnort-tool-for-Intrusion-Detection

Description: 通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理-Introduce the common snort intrusion detection tool configuration, the basic application and rules written in simple intrusion detection features, easy to understand the basic principles of intrusion detection
Platform: | Size: 217088 | Author: 萧一 | Hits:

[OtherIntrusion-detection-by-machine-learning--A-review

Description: Intrusion detection by machine learning--A review.rar
Platform: | Size: 171008 | Author: messer | Hits:

[OpenCVopencv-based-intrusion-detection

Description: 这是一个基于opencv入侵检测,跟踪目标,显示每帧入侵物的数量,并发出报警-This is a opencv-based intrusion detection, target tracking, display each frame invaders number, and alarm
Platform: | Size: 14336 | Author: 王欢 | Hits:

[OS programNetwork-intrusion-detection

Description: 入侵检测的核心技术就是从网络中获取信息,对获取的信息进行分析来进一步判定是否是发生了入侵。 -The core technology of intrusion detection is to obtain information from the network, further analysis of the information obtained to determine whether the invasion occurred.
Platform: | Size: 1593344 | Author: houying | Hits:

[Otherintrusion-detection-matlab

Description: intrusion detection algorithm in matlab
Platform: | Size: 271360 | Author: parmalik kumar | Hits:

[Windows Developintrusion-detection

Description: 入侵检测系统,可以检测各种入侵行为,还可以检测出入侵者的信息如:源IP,端口号,入侵类型等。-Intrusion Detection
Platform: | Size: 5711872 | Author: 文倩 | Hits:

[Successful incentiveAdaptation-Techniques-for-Intrusion-Detection

Description: This paper examines techniques for providing adaptation in intrusion detection and intrusion response systems
Platform: | Size: 657408 | Author: ahmed | Hits:

[ExploitIntrusion-Detection-System-Using-Wireshark

Description: Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station
Platform: | Size: 646144 | Author: ahmed | Hits:

[Windows DevelopA-HoneyPot-Network-Intrusion-Detection-System

Description: A HoneyPot Network Intrusion Detection System Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port. This file came from Planet-Source-Code.com...the home millions of lines of source code
Platform: | Size: 7168 | Author: sakthivel | Hits:

[Software Engineering31-Mining-network-data-for-intrusion-detection-th

Description: Mining network data for intrusion detection through combining SVM with ant colony
Platform: | Size: 687104 | Author: Samir | Hits:

[Software Engineering0A-study-on-intrusion-detection-using-neural-netw

Description: 0A study on intrusion detection using neural networks trained with evolutionary algorithms
Platform: | Size: 442368 | Author: ilyesben | Hits:

[AI-NN-PRnsa

Description: Intrusion detection based on immune system
Platform: | Size: 10240 | Author: aquablue | Hits:

[Internet-NetworkIDS

Description: In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old technics such as firewalls, authentication and encryption could not provide Internet security completely; So, Intrusion detection system is created as a new solution and a defense wall in cyber environment. Many studies were performed on different algorithms but the results show that using machine learning technics and swarm intelligence are very effective to reduce processing time and increase accuracy as well. In this paper, hybrid SVM and ABC algorithms has been suggested to select features to enhance network intrusion detection and incr
Platform: | Size: 11619328 | Author: alqatf | Hits:

[OS programHybrid-Intrusion-Detection-System-master

Description: hybrid intrusion detection system
Platform: | Size: 3088384 | Author: tinly | Hits:

[OS programIntrusion-Detection-System-master

Description: network intrusion detection system
Platform: | Size: 8384512 | Author: tinly | Hits:

[Otherkdd99 Intrusion detection

Description: 基于kmeans的异常检测算法,数据集是kddcup99(Based on kmeans anomaly detection algorithm, the data set is kddcup99.)
Platform: | Size: 1024 | Author: mupeieevew | Hits:

[CloudComputingintrusion detection system (IDS)

Description: intrusion detection system (IDS) Deep Learning (DL) has emerged as a new approach that delivers higher accuracy than traditional machine learning techniques. DL has the ability to process raw data and learn the high level features on its own, and so DL has a strong case for its adaptability in resource constrained networks like SDNs.
Platform: | Size: 3205378 | Author: thirumal@techquest.info | Hits:
« 1 2 3 4 56 7 8 9 10 ... 28 »

CodeBus www.codebus.net