Welcome![Sign In][Sign Up]
Location:
Search - network intrusion

Search list

[Scannernetwork-progress-detect

Description: 网络入侵检测系统,很经典,仅供学习,如有商业行为,请与本人联系-network intrusion detection systems, classic, for the sole purpose of learning, if commercial activities, please contact I
Platform: | Size: 574867 | Author: 张栋 | Hits:

[BooksThe Tao of Network Security Monitoring Beyond Intr

Description: The Tao of Network Security Monitoring Beyond Intrusion Detection
Platform: | Size: 16211968 | Author: 小云 | Hits:

[Internet-Network网络入侵检测系统(源码)

Description: 网络入侵检测系统-Network Intrusion Detection system
Platform: | Size: 2161664 | Author: 张三 | Hits:

[Internet-NetworkJIDX

Description: windows系统下用java开发的网络入侵检测程序-windows system with java development of the network intrusion detection procedures
Platform: | Size: 398336 | Author: 刘伟 | Hits:

[Internet-NetworkIDS

Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Platform: | Size: 11264 | Author: | Hits:

[Internet-Networklnids

Description: 这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
Platform: | Size: 8248320 | Author: liuliang | Hits:

[OtherIntrusion-Detection

Description: 入侵检测的相关教程,非常全面,建议对网络安全有兴趣的人阅读。-Intrusion Detection related guides, very comprehensive, network security proposed to those who are interested in reading.
Platform: | Size: 2595840 | Author: Joe Zhao | Hits:

[Othercs161.0914

Description: Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents-Intrusion Detection : Host-based Intrusion Detection Network
Platform: | Size: 57344 | Author: hn | Hits:

[Industry researchbaseAgent

Description: 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System
Platform: | Size: 100352 | Author: joe | Hits:

[Internet-Networkiids

Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Platform: | Size: 930816 | Author: yu | Hits:

[source in ebooknids

Description: 网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement
Platform: | Size: 2241536 | Author: laizhengwen | Hits:

[Internet-Networkintrusiondetection

Description: 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
Platform: | Size: 2257920 | Author: lilang | Hits:

[SCMDataMiningTechniquesfor(Network)Intrusion

Description: In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of these techniques. Finally we present a new idea on how data mining can aid IDSs.
Platform: | Size: 372736 | Author: keerthi | Hits:

[Software EngineeringIDS

Description: A Java Based Network Intrusion Detection System (IDS)
Platform: | Size: 29696 | Author: idriss | Hits:

[AI-NN-PRKohonen-network-clustering-algorithm

Description: kohonen网络的聚类算法—网络入侵聚类-Kohonen network clustering algorithm, clustering network intrusion
Platform: | Size: 88064 | Author: jiaxing | Hits:

[Exploitintrusion-detection

Description: VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
Platform: | Size: 2836480 | Author: 武东亮 | Hits:

[Mathimatics-Numerical algorithmsNetwork-intrusion-clustering

Description: 这是一个用于对网络入侵数据进行分类的程序,具有非常好的聚类效果。-This is a data classification procedure for the network intrusion , it has very good cluster results
Platform: | Size: 25600 | Author: 高文军 | Hits:

[matlabNetwork-intrusion

Description: kohonen网络的聚类算法,网络入侵聚类,matlab的经典算法- kohonen网络的聚类算法,网络入侵聚类,matlab的经典算法 Clustering algorithm of Kohonen network, the network intrusion clustering, matlab algorithm
Platform: | Size: 88064 | Author: 秦伟 | Hits:

[Windows DevelopA-HoneyPot-Network-Intrusion-Detection-System

Description: A HoneyPot Network Intrusion Detection System Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port. This file came from Planet-Source-Code.com...the home millions of lines of source code
Platform: | Size: 7168 | Author: sakthivel | Hits:

[AI-NN-PRnetwork-clustering-network-intrusion

Description: 基于PCA有监督kohonen网络的网络入侵聚类。里面包含有原代码和说明文件。-Based on PCA supervised kohonen network clustering network intrusion
Platform: | Size: 93184 | Author: Winjade | Hits:
« 12 3 4 5 6 7 8 9 10 ... 14 »

CodeBus www.codebus.net