搜索资源列表
MarkovAnalysis
- 用C++编写的遗传算法,markov是应用在入侵检测上的 用的数据是 http://www.cs.unm.edu/~immsec/data/synth-sm.html 上的 -prepared by the genetic algorithm, Markov is the application Intrusion Detection of the data used is http : / / ~ www.cs.unm.edu/ immsec / data / Jr.-sm.h the
lisys-0.1
- 基于人工免疫原理的入侵检测系统框架,有着很好的扩展性,由java 语言实现。-on the immune-based Intrusion Detection System Framework, the good scalability, java language.
motiondetect
- 本程序是基于VC++和opencv开发的视频入侵检测预警程序,在目标进入危险区域,提示警示语-This procedure is based on VC++ and opencv video intrusion detection development of early warning procedures, the goal of entering the hazardous area, prompted warnings
kmeanssource
- kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
LS-SVM
- 基于LS-SVM的入侵检测模型与实时测试平台研究-LS-SVM based intrusion detection model and real-time test platform for research
BP_nids
- 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
lab
- 基于2叉树svm的入侵检测算法,构造偏态二叉-2-tree SVM-based intrusion detection algorithms, binary structure skewness
cnbjn
- 评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学 说和危险模式理论的应用研究现状 -Immunology principle and its application in intrusion detection in recentyearswere reviewed. The research on antibody clonal selection theory, immune networks and danger theorywere emphasi
paper
- 关联规则论文: GP在入侵检测规则提取中的适应度函数设计.pdf 采用数据挖掘的入侵检测技术研究.pdf 分类规则挖掘算法综述.pdf -Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
Research_on_Network_intrusion_detection_based_on_d
- 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的 审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人 的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实 验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system
General_neural_network_of_clustering_algorithm
- 模糊聚类虽然能够对数据聚类挖掘,但是由于网络入侵特征数据维数较多,不同入侵类别间的数据差别较小,不少入侵模式不能被准确分类。本案例采用结合模糊聚类和广义神经网络回归的聚类算法对入侵数据进行分类。 -Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was l
svm-Intrusion-Detection
- SVM用于入侵检测的PPT,适合初学者,有关于SVM理论的介绍,入门。-SVM for intrusion detection of PPT, suitable for beginners, an introduction on the SVM theory, Getting Started.
Script-based-Gigabit-Intrusion-Prevention-Model-o-
- 基于脚本的千兆位入侵防御开放模型研究scr ipt-based Gigabit Intrusion Prevention Model of Open-scr ipt-based Gigabit Intrusion Prevention Model of Open
Ann3
- 基于广义神经网络的聚类算法的网络入侵聚类的matlab源程序以及数据-Based on generalized neural network clustering algorithm matlab source network intrusion and data clustering
Kohonen-network-clustering-algorithm
- kohonen网络的聚类算法—网络入侵聚类-Kohonen network clustering algorithm, clustering network intrusion
BP-Intrusion-Detection-System
- 本文详细介绍了BP神经网络在入侵检测系统中的应用及优化。-This paper describes the application and optimization of the BP neural network intrusion detection system.
Hacker-intrusion-detection-system
- 本文的目的就是对人工神经网络进行适当的改进,将其应用于网络黑客入侵检测系统中,以提高系统的效率,包括检测速度的提高、减少漏报率和误报率-The purpose of this paper is the appropriate improvement of artificial neural networks, intrusion detection system applied to hackers in order to improve the efficiency of the system
network-clustering-network-intrusion
- 基于PCA有监督kohonen网络的网络入侵聚类。里面包含有原代码和说明文件。-Based on PCA supervised kohonen network clustering network intrusion
neural-network-intrusion
- 用于检测神经网路的入侵问题的源程序代码,另有一些简单的实验结果分析数据-Neural network for the intrusion detection of the source code, and some simple experimental results analysis data
nsa
- Intrusion detection based on immune system