搜索资源列表
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
Analysis-of-C4.5-Algorithm
- Application and Analysis of C4.5 Algorithm
C4.5
- 这是介绍c4.5算法的一篇文章,非常清楚-It is an article about c4.5 algorithm,which is quite clear.
adaboost
- Now, you ought to implement the AdaBoost.M1 and AdaBoost.M2 algorithms. These algorithms are two versions of the AdaBoost algorithm for handling the Problems with more than two classes. You must first read the paper “Experiments with a New Boosti