搜索资源列表
MarkovAnalysis
- 用C++编写的遗传算法,markov是应用在入侵检测上的 用的数据是 http://www.cs.unm.edu/~immsec/data/synth-sm.html 上的 -prepared by the genetic algorithm, Markov is the application Intrusion Detection of the data used is http : / / ~ www.cs.unm.edu/ immsec / data / Jr.-sm.h the
lisys-0.1
- 基于人工免疫原理的入侵检测系统框架,有着很好的扩展性,由java 语言实现。-on the immune-based Intrusion Detection System Framework, the good scalability, java language.
MWM
- 多模式字符串匹配算法WU-MANNER算法的实现,从入侵检测系统SNORT提取出来。
基于差分进化的网络异常入侵检测
- 基于差分进化和k-mean算法的网络异常入侵检测算法程序代码
motiondetect
- 本程序是基于VC++和opencv开发的视频入侵检测预警程序,在目标进入危险区域,提示警示语-This procedure is based on VC++ and opencv video intrusion detection development of early warning procedures, the goal of entering the hazardous area, prompted warnings
kmeanssource
- kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
LS-SVM
- 基于LS-SVM的入侵检测模型与实时测试平台研究-LS-SVM based intrusion detection model and real-time test platform for research
DataCheck
- 入侵检测数据检测算法,根据C4.5源码改编-Intrusion detection data detection algorithm, in accordance with C4.5 source adaptation
BP_nids
- 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
lab
- 基于2叉树svm的入侵检测算法,构造偏态二叉-2-tree SVM-based intrusion detection algorithms, binary structure skewness
ruih
- 分析了人工免疫系统的原理,简单建立了一种基于否定选择算法的网络入侵检测系统, 引入了一种用于异常事件识别的r-字符块匹配规则,并对规则存在的漏洞进行了分析。 -The paper gives a brief introduction to the principle of Immune System·In particular,the paper gives a simple NIDS model based on negative selection algorithm,intro
cnbjn
- 评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学 说和危险模式理论的应用研究现状 -Immunology principle and its application in intrusion detection in recentyearswere reviewed. The research on antibody clonal selection theory, immune networks and danger theorywere emphasi
EntropyOutlier
- 查找孤立点 JAVA代码,简单易用,孤立点,即数据中不同于数据一般模型的数据对象,可能由度量或执行错误导致,也可能是固有数据变异性的结果,预示着重要的信息。与一般热门研究课题不同,目前没有任何一款国际认可的软件可以直接对对孤立点进行检测与分析,孤立点检测与分析的算法研究是近年来数据挖掘领域新兴的复杂困难而有意义的课题。在诈骗检测、贷款申请处理、网络入侵检测、时间序列检测、网路性能监视、故障诊断、图像中检测噪声点等方面都有广泛的应用。-outlier detection
192010k-average
- kmeans均值聚类算法:一种改进的基于半监督聚类的入侵检测算法ASCID(Active-learning Semi-supervised Clustering Intrusion Detection),-kmeans clustering algorithm Algorithm was simulated by KDD 99 datasets, which the experimental results demonstrate that ASCID algorithm can impro
81404566ssl_survey
- 基于半监督学习的入侵检测技术研究 聚类程序- Intrusion Detection Algorithm Based on semi-supervised learning
paper
- 关联规则论文: GP在入侵检测规则提取中的适应度函数设计.pdf 采用数据挖掘的入侵检测技术研究.pdf 分类规则挖掘算法综述.pdf -Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
a
- 基于改进BP算法的入侵检测神经网络方法.-Algorithm based on improved BP neural network intrusion detection.
juleifenxizairuqinjiance
- 聚类分析在入侵检测中的应用研究,09最新论文,从CNKI上买来的,希望对大家有用。-Cluster Analysis in Intrusion Detection Research, 09 latest papers, bought from CNKI on, we want to be useful.
adaptiveintuitionisticfuzzyreasoning
- 将直觉模糊集理论引入信息安全领域,自适应直觉模糊推理的入侵检测方法-The intuitionistic fuzzy set theory is introduced to the field of information security, intuitionistic fuzzy reasoning adaptive intrusion detection method
KDD99-SVM
- 根据SVM,基于向量机算法的入侵检测系统,依托的是KDD99数据集(According to SVM, the intrusion detection system based on vector machine algorithm relies on KD99 data set.)