搜索资源列表
baseAgent
- 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a
IDS111223
- 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
BP.IDS
- 基于神经网络的入侵管理系统。在毕业设计中有参考意义。-Network-based Intrusion Detection using Neural Networks 。
A-hybrid-IDS-design
- 本文使用麻省理工学院林肯实验室的网络流量数据( IDEVAL )作为检测混合入侵检测系统性能的试验数据。混合入侵检测系统获得的结果和的基于误用检测入侵检测系统相比较表明,混合入侵检测系统是一个更强大的系统-In this paper, Massachusetts Institute of Technology Lincoln Laboratory data of network traffic (IDEVAL) as the detection of hybrid intrusion detec
intrusiondetectionbasedonmachinelearning
- 基于机器学习的入侵检测技术研究,机器学习是CS领域中最好玩的分支之一。把它应用到网络安全领域也是很有意思的。-Intrusion detection based on machine learning technology research, the field of machine learning is the CS branch of one of the most fun. And apply it to the field of network security is also ver
DistributedIntrusionDetection
- Distributed Intrusion Detection for network
research_on_mobile_ad_hod_network_intrusion_detect
- 移动自组织网络入侵检测技术研究 论文-research on mobile ad hod network intrusion detection technology
moshipipeizaiwangluoruqingjiancexitongyingyong
- 本文是网络入侵检测中模式匹配算法的研究,文件需caj打开-This is a network intrusion detection pattern matching algorithm, the file be opened caj
IDS
- A Java Based Network Intrusion Detection System (IDS)
UsingGAforNetworkIntrusionDetection
- Using GA for Network Intrusion Detection
Wireless-network-intrusion-trip
- 本文档教你如何一步 利用无线网漏洞来破解密码-This document to teach you step by step how to use the wireless network vulnerabilities to crack passwords
Snort
- Snort是一个以开放源代码形式发行的一个功能强大、跨平台、轻量级的网络入侵检测系统,本文详细介绍了snort的安装过程及配置使用-Snort is an open source issued a powerful, cross-platform, lightweight network intrusion detection system, the paper describes the the snort installation process and the configuration
111
- 聚类优化算法。 kohonen网络的聚类算法—网络入侵聚类-Clustering optimization algorithms. kohonen network clustering algorithm- Network Intrusion Clustering
security--structure--migrate-to-vm
- 传统安全系统结构能否移植到虚拟机平台,虚拟机中移植传统网络入侵检测系统存在的问题分析,虚拟机中移植传统网络入侵检测系统可行性分析,虚拟机中移植传统网络入侵检测系统实现。-Traditional security system structure can migrate to a virtual machine platform, virtual machine migration traditional network intrusion detection system problem ana
ebook-NIDS
- Network Intrusion Detection e book
IDS1-(1)
- Network intrusion detection system
31-Mining-network-data-for-intrusion-detection-th
- Mining network data for intrusion detection through combining SVM with ant colony
Network-Tools
- 【常用网络工具】网络扫描软件Nmap;网络监听工具wireshark;入侵检测系统Snort;-[commonly used network tools] network scanning software Nmap network monitoring tool Wireshark intrusion detection system Snort
Multi-Agent-Based-IDS-for-WSN
- 本文提出一种无线传感器网络入侵检测解决方案针对分簇式无线传感器网络的特点, 通过让节点和簇头分别执行不同检测任务, 结合本地检测和联合检测, 并采用多个代理模块分别实现数据收集、分析检测和入侵响应和代理管理的任务,是一套完整的IDS体系。-This paper proposes a wireless sensor network intrusion detection characteristics solutions cluster wireless sensor network, data
KDD99
- KDDCUP99数据集解析说明,可以用来做网络入侵检测系统的分析验证-KDDCUP99 described parsing data set can be used for analysis to verify network intrusion detection system