CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - anomaly based

搜索资源列表

  1. databortfor2410

    0下载:
  2. 基于ARM920T内核的S3C2410下的databort(数据异常模式)程序,ARM所作-Based on ARM920T core of the S3C2410 databort (data anomaly pattern ) process by ARM
  3. 所属分类:嵌入式Linux

    • 发布日期:2008-10-13
    • 文件大小:27.83kb
    • 提供者:陈好
  1. a

    0下载:
  2. 基于C++的网络嗅探器系统的设计与实现 可以进行数据包的解析和了解-Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread and dangerous. The existing signature-based intrusion detection mechanisms are often not sufficient in detecting these types of a
  3. 所属分类:CSharp

    • 发布日期:2017-05-16
    • 文件大小:4.14mb
    • 提供者:李峥
  1. qpso

    6下载:
  2. 在网络异常检测中,为了提高对异常状态的检测率,降低对正常状态的误判率,本文提出一种基于量子粒子群优化算法训练小波神经网络进行网络异常检测的新方法。利用量子粒子群优化算法(QPSO)训练小波神经网络,将小波神经网络(WNN)中的参数组合作为优化算法中的一个粒子,在全局空间中搜索具有最优适应值的参数向量。- In order to improve the detection rate for anomaly state and reduce the false positive rate for n
  3. 所属分类:matlab

    • 发布日期:2014-05-23
    • 文件大小:722byte
    • 提供者:liang
  1. IDSfazhan

    0下载:
  2. 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。-Since 1980, the concept of generated IDS has been a host-based and network-based intrusion detection system, a model of knowledge-based recognition, ident
  3. 所属分类:Network Security

    • 发布日期:2017-04-14
    • 文件大小:3.11kb
    • 提供者:丝琪儿
  1. 20090826_kepler_solver

    1下载:
  2. 给出了采用牛顿法解超越方程,求解椭圆轨道及双曲线轨道开普勒方程中的偏近点角的源程序及例子;给出了解普适方程的函数及例子,是研究轨道理论中的重要函数,均基于matlab编程-Gives the solution of transcendental equation using Newton' s method, for solving elliptic orbit and the hyperbolic orbits Kepler equation Eccentric anomaly of t
  3. 所属分类:transportation applications

    • 发布日期:2017-04-14
    • 文件大小:4.01kb
    • 提供者:刘涛
  1. nk2

    0下载:
  2. 半监督异常行为监测pdf,提出新的基于半监督学习的行为建模与异常检测方法,采用基于动态时间归整的归一化距离来建立相似矩阵-Semi-supervised monitoring abnormal behavior pdf, propose a new semi-supervised Learning based on behavior modeling and anomaly detection methods, based on Dynamic Time Warping of the norma
  3. 所属分类:software engineering

    • 发布日期:2017-04-06
    • 文件大小:429.69kb
    • 提供者:王自
  1. AnAnomalyBasedApproachforIntrusion

    0下载:
  2. A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:672.4kb
    • 提供者:keerthi
  1. AttacksClassificationinAdaptivIntrusion

    0下载:
  2. Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
  3. 所属分类:Windows Develop

    • 发布日期:2017-03-31
    • 文件大小:304.76kb
    • 提供者:keerthi
  1. protocol_anomaly_detection

    0下载:
  2. This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters versus anomaly filters, an
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-03
    • 文件大小:17.18kb
    • 提供者:sinsin
  1. protocol-anomaly-detection-network-based-intrusio

    0下载:
  2. A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categories of detection principle
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-03-23
    • 文件大小:81.08kb
    • 提供者:sinsin
  1. UnsupervisedAnomalyDetectionBasedOnPrincipalCompon

    0下载:
  2. 入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process
  3. 所属分类:Document

    • 发布日期:2017-03-29
    • 文件大小:439.73kb
    • 提供者:lwh
  1. heightextreme

    1下载:
  2. 包含所需的数据格式,完成根据已知高程异常建模数据,建立高程异常模型求解模型常数;并根据未知点坐标数据,求解该点的高程异常。主要用于测绘方面,在求解各地高程异常方面有着较广泛的用途。-Contains the required data format, complete the height anomaly modeling based on known data to establish the height anomaly model to solve the model constants
  3. 所属分类:CSharp

    • 发布日期:2017-04-17
    • 文件大小:218.76kb
    • 提供者:周顺
  1. HMM_anomaly_detection

    0下载:
  2. 本文从HMM的基本思想、概念出发,建立了基于网络的HMM异常检测原型。对原型在实际应用环境中产生的问题,提出了对观测对象(数据包头部)进行分段的改进办法,进而建立了具有可操作性的HMM异常检测模型。-From the basic thought and concept of HMM,the article establishes the prototype of HMM anomaly detection based on network.To resolve some problems whi
  3. 所属分类:Speech/Voice recognition/combine

    • 发布日期:2017-04-02
    • 文件大小:444.13kb
    • 提供者:陈中
  1. Hyperspectral-image

    0下载:
  2. 高光谱图像异常检测的算法,基于高光谱图像处理的一种算法-Hyperspectral image anomaly detection algorithm, based on a hyperspectral image processing algorithms
  3. 所属分类:Special Effects

    • 发布日期:2017-03-29
    • 文件大小:755.9kb
    • 提供者:高雷
  1. fft

    1下载:
  2. 傅立叶变换方法并利用数据高程模型计算重力异常-Calculating gravity anomaly based on the DEM
  3. 所属分类:Wavelet

    • 发布日期:2017-06-20
    • 文件大小:29.99mb
    • 提供者:邹尧
  1. anomaly-detection

    0下载:
  2. 自适应的基于ROC的HMMs在异常检测中的应用-Adaptive ROC-based ensembles of HMMs applied to anomaly detection
  3. 所属分类:Project Manage

    • 发布日期:2017-11-07
    • 文件大小:886.21kb
    • 提供者:Jeniffer1
  1. Hyperspectral-anomaly-detection-1

    0下载:
  2. 这是一个基于波段子集特征融合的高光谱图像异常检测算法,研究高光谱目标检测的同学可以参考一下。-This is an image-based anomaly detection algorithm for hyperspectral subset of feature fusion band, hyperspectral target detection research students can refer to it.
  3. 所属分类:Special Effects

    • 发布日期:2017-04-24
    • 文件大小:290.21kb
    • 提供者:wudaoer
  1. anomaly-detection

    1下载:
  2. 异常检测算法,包括基于聚类的、基于分类的、基于ocsvm的异常检测算法-Anomaly detection algorithms, including those based on clustering, based on the classification based anomaly detection algorithm ocsvm
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-12
    • 文件大小:939byte
    • 提供者:李东
  1. 30934-30685-1-PB

    0下载:
  2. The title of my paper is An overview of anomaly based intrusion detection systems .-The title of my paper is An overview of anomaly based intrusion detection systems .
  3. 所属分类:software engineering

    • 发布日期:2017-04-29
    • 文件大小:484.11kb
    • 提供者:Mina
  1. group-anomaly-detection

    0下载:
  2. 基于光流直方图和稀疏表示的群体异常事件检测-Detecting abnormal events based group optical flow histogram and sparse representation
  3. 所属分类:Document

    • 发布日期:2017-05-25
    • 文件大小:7.75mb
    • 提供者:耿月
« 12 »
搜珍网 www.dssz.com