当前位置:
首页
资源下载
![](/images/right.gif)
搜索资源 - intrusion detection
搜索资源列表
-
0下载:
优秀本科毕业论文-有关于入侵检测系统方面的,Outstanding undergraduate thesis- on the intrusion detection systems
-
-
1下载:
kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
-
-
0下载:
基于LS-SVM的入侵检测模型与实时测试平台研究-LS-SVM based intrusion detection model and real-time test platform for research
-
-
0下载:
Intrusion detection for black hole attack on AODV protocol.
-
-
1下载:
入侵检测数据检测算法,根据C4.5源码改编-Intrusion detection data detection algorithm, in accordance with C4.5 source adaptation
-
-
0下载:
作者自己修改的一个基于网络的入侵检测系统-The author himself revised a web-based Intrusion Detection System
-
-
0下载:
模式识别中的入侵检测算法1,不错的内容啦-pattern recognition of an intrusion detection algorithm, as well--
-
-
0下载:
网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
-
-
0下载:
基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
-
-
0下载:
基于2叉树svm的入侵检测算法,构造偏态二叉-2-tree SVM-based intrusion detection algorithms, binary structure skewness
-
-
0下载:
评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学
说和危险模式理论的应用研究现状
-Immunology principle and its application in intrusion detection in recentyearswere reviewed. The research on
antibody clonal selection theory, immune networks and danger theorywere emphasi
-
-
1下载:
关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
-
-
0下载:
入侵检测算法,计算机常用的工具,聚类分析-Intrusion detection algorithm, commonly used computer tools, cluster analysis
-
-
0下载:
网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
-
-
0下载:
本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态
-
-
0下载:
This an intrusion detection code.
I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code.
I hope this will help people doing work in IDS with secure aodv..
-
-
0下载:
kmeans均值聚类算法:一种改进的基于半监督聚类的入侵检测算法ASCID(Active-learning Semi-supervised Clustering Intrusion Detection),-kmeans clustering algorithm
Algorithm was simulated by KDD 99 datasets, which the experimental results demonstrate that ASCID algorithm can impro
-
-
0下载:
In Information Security, intrusion detection is the act
of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource. Intrusion detection does not,
in general, include prevention of intrusions. In
-
-
1下载:
VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
-
-
0下载:
Intrusion Detection for network security
-
« 12
3
4
5
6
7
8
9
10
...
21
»