The Tao of Network Security Monitoring Beyond Intrusion Detection
資源簡介:The Tao of Network Security Monitoring Beyond Intrusion Detection
上傳時間: 2014-08-15
上傳用戶:zwei41
資源簡介:The public key infrastructure (PKI) is the foundation and center of network Security architecture now, can provide Security services including confidentiality, authentication, dig2ital signatures and integrity.
上傳時間: 2014-01-23
上傳用戶:pompey
資源簡介:基于PIC單片機的低功耗讀卡器硬件設計:本文提出了一個完整的基于串口的智能讀卡器子系統設計方案并將其實現。讀卡器的設計突出了小型化的要求,全部器件使用貼片封裝。為了減小讀卡器的體積,設計中還使用了串口竊電的技術,使用串口信號線直接給讀卡器供電。...
上傳時間: 2014-04-14
上傳用戶:wanghui2438
資源簡介:The Network Security Response Framework (NSRF) allows for testing different computer Security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
上傳時間: 2013-12-03
上傳用戶:ippler8
資源簡介:自適應(Adaptive)神經網絡源程序 The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.~..~ There are 11 blocks that implement basically t...
上傳時間: 2015-04-09
上傳用戶:ywqaxiwang
資源簡介:* A ncurses user interface. * Network statistics to view the amount of packets and data in many different protocols, interfaces and hosts. * View what active TCP connections are on the network. * View UDP packets. * View and log ICM...
上傳時間: 2015-04-20
上傳用戶:bjgaofei
資源簡介:The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.~..~ There are 11 blocks that implement basically these 5 kinds of neural networks:...
上傳時間: 2013-12-23
上傳用戶:teddysha
資源簡介:The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory
上傳時間: 2013-12-27
上傳用戶:陽光少年2016
資源簡介:According to the business enterprise marketing risk early warning of the artificial nerve network
上傳時間: 2015-10-12
上傳用戶:leehom61
資源簡介:The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.
上傳時間: 2015-12-01
上傳用戶:181992417
資源簡介:detailed description of network driver design for uclinux. It s quite good for the understanding the work flow of ethernet driver in uclinux
上傳時間: 2014-06-17
上傳用戶:rocketrevenge
資源簡介:『下載說明』這里提供給大家的是早已金盆洗手的著名黑客KEVIN D. MITNICK將其一生積累下來的豐富技能匯集成書的《The Art of Intrusion》(入侵的藝術)英文版的PDF格式電子書下載。
上傳時間: 2014-01-14
上傳用戶:cc1
資源簡介:The usage of devices in a communication network requires configuration of the device parameters and communication facilities. CANopen defines a standardised way to access these parameters
上傳時間: 2013-12-23
上傳用戶:wangzhen1990
資源簡介:All the PDF file is about the data management in wireless sensor network, especially the side of energy efficiency
上傳時間: 2013-12-29
上傳用戶:星仔
資源簡介:Isisns is an extension of Network Simulator (ns) for the IS-IS routing protocol. It is focused on simulation of network dynamics and convergence.
上傳時間: 2016-11-06
上傳用戶:thesk123
資源簡介:Produces a matrix of derivatives of network output w.r.t. % each network weight for use in the functions NNPRUNE and NNFPE.
上傳時間: 2013-12-18
上傳用戶:sunjet
資源簡介:Document showing the use of eigenfaces and neural network together for face recognition
上傳時間: 2014-01-16
上傳用戶:蟲蟲蟲蟲蟲蟲
資源簡介:Express gatool use of MATLAB in the implementation of training neural network genetic algorithm procedure
上傳時間: 2014-08-01
上傳用戶:84425894
資源簡介:this is the olsr code for any version of network simulator(ns2).
上傳時間: 2017-05-19
上傳用戶:zhaiye
資源簡介:Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those c...
上傳時間: 2014-01-02
上傳用戶:zhangyigenius
資源簡介:Computer name and the name of the determination of computer network application.
上傳時間: 2014-01-16
上傳用戶:1079836864
資源簡介:David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the Ro...
上傳時間: 2014-01-08
上傳用戶:netwolf
資源簡介:Good Security provider by using biometric feature as key. This is the program of server.
上傳時間: 2013-12-07
上傳用戶:c12228
資源簡介:I would like to thank you for purchasing the second edition of “Industrial Network Security,” especially if you are one of the many supporters of the first edition. When the second edition was announced, many people asked me, “why a seco...
上傳時間: 2020-06-07
上傳用戶:shancjb
資源簡介:Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software i...
上傳時間: 2015-04-30
上傳用戶:bjgaofei
資源簡介:The government of a small but important country has decided that the alphabet needs to be streamlined and reordered. Uppercase letters will be eliminated. They will issue a royal decree in the form of a String of B and A characters. The fir...
上傳時間: 2015-06-09
上傳用戶:weixiao99
資源簡介:The Netlab toolbox is designed to provide the central tools necessary for the simulation of theoretically well founded neural network algorithms and related models for use in teaching, research and applications development. It contains m...
上傳時間: 2013-12-11
上傳用戶:hj_18
資源簡介:This demo nstrates the use of the reversible jump MCMC simulated annealing for neural networks. This algorithm enables us to maximise the joint posterior distribution of the network parameters and the number of basis function. It performs a...
上傳時間: 2015-07-19
上傳用戶:ma1301115706
資源簡介:This code in this directory implements the binary hopfield network. Source code may be found in HOPNET.CPP. A sample training file is H7x8N4.trn. Sample test pattern files are: H7x8D4.TST, H5x8D7.TST, H5x8D7.TST and H5x8D9.TST, Output of...
上傳時間: 2014-01-16
上傳用戶:123啊
資源簡介:Streaming refers to the ability of an application to play synchronised media streams like audio and video streams in a continuous way while those streams are being transmitted to the client over a data network.
上傳時間: 2015-10-22
上傳用戶:athjac