搜索资源列表
-
0下载:
轻量级的入侵检测系统snort的源代码分析轻量级的入侵检测系统snort的源代码分析-lightweight snort intrusion detection system source code analysis lightweight snort intrusion detection system the source code analysis
-
-
0下载:
The Algorithm of Detectors Generating in Intrusion Detection System
Based on Artificial Immune Theory-The Algorithm of Detectors Generating in I ntrusion Detection System Based on Artificial Immune Theory
-
-
0下载:
文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a
-
-
0下载:
本文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,提出了一种基于移动代理的入侵监测系统结构-Based on the intrusion detection technology on the basis of content, Mobile Agent technology will be the introduction of Intrusion Detection System, a Mobile Agent Based Intrusion Detection Sys
-
-
0下载:
针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
-
-
0下载:
基于数据挖掘技术的入侵检测系统的设计思路与模型,以及改进思路-Based on Data Mining Intrusion Detection System Design and model, as well as ideas to improve
-
-
0下载:
本文使用麻省理工学院林肯实验室的网络流量数据( IDEVAL )作为检测混合入侵检测系统性能的试验数据。混合入侵检测系统获得的结果和的基于误用检测入侵检测系统相比较表明,混合入侵检测系统是一个更强大的系统-In this paper, Massachusetts Institute of Technology Lincoln Laboratory data of network traffic (IDEVAL) as the detection of hybrid intrusion detec
-
-
0下载:
基于模式匹配的Windows主机入侵检测系统研究.-Based on pattern matching Windows Host Intrusion Detection System.
-
-
0下载:
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the te
-
-
0下载:
入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process
-
-
0下载:
A Java Based Network Intrusion Detection System (IDS)
-
-
0下载:
intrusion detection information.in these process used to recover the intrusion system
-
-
0下载:
基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research
-
-
0下载:
intrusion detection system on immune
-
-
0下载:
snort入侵检测系统中文手册,对于snort的安装配置进行来详细的讲解-snort intrusion detection system Chinese manual for the snort installation and configuration detail explain
-
-
0下载:
Snort是一个以开放源代码形式发行的一个功能强大、跨平台、轻量级的网络入侵检测系统,本文详细介绍了snort的安装过程及配置使用-Snort is an open source issued a powerful, cross-platform, lightweight network intrusion detection system, the paper describes the the snort installation process and the configuration
-
-
0下载:
传统安全系统结构能否移植到虚拟机平台,虚拟机中移植传统网络入侵检测系统存在的问题分析,虚拟机中移植传统网络入侵检测系统可行性分析,虚拟机中移植传统网络入侵检测系统实现。-Traditional security system structure can migrate to a virtual machine platform, virtual machine migration traditional network intrusion detection system problem ana
-
-
0下载:
SECURE INTRUSION-DETECTIONSYSTEM FOR MANETS
Abstract:
Our goal is to detect malicious nodes by proposing a new IDS specially designed for MANETs ,which aims to solve
receiver collision
limited transmission power
false misbehavior proble
-
-
0下载:
Network intrusion detection system
-
-
0下载:
a comparative performance uation paper on intrusion detection system for wireless sensor networks-a comparative performance uation paper on intrusion detection system for wireless sensor networks
-