搜索资源列表
-
1下载:
snort-2.1.0入侵检测-intrusion detection system snort-2.1.0
-
-
0下载:
入侵检测系统.linux下与MySql连用的例子-The example of intrusion detection system with MySql, under the system of linux
-
-
2下载:
ACID入侵检测分析台可提供图形用户界面以及-ACID Intrusion Detection Analysis of Taiwan may provide the graphical user interface and
-
-
1下载:
windows系统下用java开发的网络入侵检测程序-windows system with java development of the network intrusion detection procedures
-
-
0下载:
也是一个linux系统下的网络入侵检测程序-System Network Intrusion Detection procedures
-
-
0下载:
不错的snort源码分析材料,作者首先介绍了snort原理和架构,然后分析snort源码,对于理解入侵检测很有帮助。-Analysis snort good source material, the author first introduced the principle and structure of snort, and then snort source analysis, intrusion detection helpful for understanding.
-
-
0下载:
Intrusion detection for black hole attack on AODV protocol.
-
-
0下载:
作者自己修改的一个基于网络的入侵检测系统-The author himself revised a web-based Intrusion Detection System
-
-
0下载:
p2p异常流量检测,基于传输层特征检测,能检测出基本P2P应用所产生的P2P流量-p2p traffic anomaly detection
-
-
1下载:
CCNP\ccnp课件\入侵检测系统_Linux\snort-2.8.3.1.tar.gz-CCNP \ ccnp courseware \ Intrusion Detection System _Linux \ snort-2.8.3.1.tar.gz
-
-
0下载:
A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs.
The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main
categories of detection principle
-
-
0下载:
一篇入侵检测方面外文,希望对大家学习有用-An intrusion detection aspects of foreign language, we want to learn useful
-
-
1下载:
VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
-
-
0下载:
基于协议分析的入侵检测系统,主要说明了入侵检测各个模块的实现方式-based on protocol analysis, intrusion detection systems, the main network intrusion detection module
-
-
0下载:
linux环境下运行的,以c语言编程的入侵检测系统-running under the linux environment, intrusion detection system to the c programming language
-
-
0下载:
入侵检测的核心技术就是从网络中获取信息,对获取的信息进行分析来进一步判定是否是发生了入侵。 -The core technology of intrusion detection is to obtain information from the network, further analysis of the information obtained to determine whether the invasion occurred.
-
-
0下载:
Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station
-
-
0下载:
intrusion detection code in matlab with kddcup99 dataset
-
-
0下载:
hybrid intrusion detection system
-
-
0下载:
network intrusion detection system
-