The Tao of Network Security Monitoring Beyond Intrusion Detection
资源简介:The Tao of Network Security Monitoring Beyond Intrusion Detection
上传时间: 2014-08-15
上传用户:zwei41
资源简介:The public key infrastructure (PKI) is the foundation and center of network Security architecture now, can provide Security services including confidentiality, authentication, dig2ital signatures and integrity.
上传时间: 2014-01-23
上传用户:pompey
资源简介:基于PIC单片机的低功耗读卡器硬件设计:本文提出了一个完整的基于串口的智能读卡器子系统设计方案并将其实现。读卡器的设计突出了小型化的要求,全部器件使用贴片封装。为了减小读卡器的体积,设计中还使用了串口窃电的技术,使用串口信号线直接给读卡器供电。...
上传时间: 2014-04-14
上传用户:wanghui2438
资源简介:The Network Security Response Framework (NSRF) allows for testing different computer Security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
上传时间: 2013-12-03
上传用户:ippler8
资源简介:自适应(Adaptive)神经网络源程序 The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.~..~ There are 11 blocks that implement basically t...
上传时间: 2015-04-09
上传用户:ywqaxiwang
资源简介:* A ncurses user interface. * Network statistics to view the amount of packets and data in many different protocols, interfaces and hosts. * View what active TCP connections are on the network. * View UDP packets. * View and log ICM...
上传时间: 2015-04-20
上传用户:bjgaofei
资源简介:The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.~..~ There are 11 blocks that implement basically these 5 kinds of neural networks:...
上传时间: 2013-12-23
上传用户:teddysha
资源简介:The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory
上传时间: 2013-12-27
上传用户:阳光少年2016
资源简介:According to the business enterprise marketing risk early warning of the artificial nerve network
上传时间: 2015-10-12
上传用户:leehom61
资源简介:The adaptive Neural Network Library is a collection of blocks that implement several Adaptive Neural Networks featuring different adaptation algorithms.
上传时间: 2015-12-01
上传用户:181992417
资源简介:detailed description of network driver design for uclinux. It s quite good for the understanding the work flow of ethernet driver in uclinux
上传时间: 2014-06-17
上传用户:rocketrevenge
资源简介:『下载说明』这里提供给大家的是早已金盆洗手的著名黑客KEVIN D. MITNICK将其一生积累下来的丰富技能汇集成书的《The Art of Intrusion》(入侵的艺术)英文版的PDF格式电子书下载。
上传时间: 2014-01-14
上传用户:cc1
资源简介:The usage of devices in a communication network requires configuration of the device parameters and communication facilities. CANopen defines a standardised way to access these parameters
上传时间: 2013-12-23
上传用户:wangzhen1990
资源简介:All the PDF file is about the data management in wireless sensor network, especially the side of energy efficiency
上传时间: 2013-12-29
上传用户:星仔
资源简介:Isisns is an extension of Network Simulator (ns) for the IS-IS routing protocol. It is focused on simulation of network dynamics and convergence.
上传时间: 2016-11-06
上传用户:thesk123
资源简介:Produces a matrix of derivatives of network output w.r.t. % each network weight for use in the functions NNPRUNE and NNFPE.
上传时间: 2013-12-18
上传用户:sunjet
资源简介:Document showing the use of eigenfaces and neural network together for face recognition
上传时间: 2014-01-16
上传用户:虫虫虫虫虫虫
资源简介:Express gatool use of MATLAB in the implementation of training neural network genetic algorithm procedure
上传时间: 2014-08-01
上传用户:84425894
资源简介:this is the olsr code for any version of network simulator(ns2).
上传时间: 2017-05-19
上传用户:zhaiye
资源简介:Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those c...
上传时间: 2014-01-02
上传用户:zhangyigenius
资源简介:Computer name and the name of the determination of computer network application.
上传时间: 2014-01-16
上传用户:1079836864
资源简介:David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the Ro...
上传时间: 2014-01-08
上传用户:netwolf
资源简介:Good Security provider by using biometric feature as key. This is the program of server.
上传时间: 2013-12-07
上传用户:c12228
资源简介:Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software i...
上传时间: 2015-04-30
上传用户:bjgaofei
资源简介:The government of a small but important country has decided that the alphabet needs to be streamlined and reordered. Uppercase letters will be eliminated. They will issue a royal decree in the form of a String of B and A characters. The fir...
上传时间: 2015-06-09
上传用户:weixiao99
资源简介:The Netlab toolbox is designed to provide the central tools necessary for the simulation of theoretically well founded neural network algorithms and related models for use in teaching, research and applications development. It contains m...
上传时间: 2013-12-11
上传用户:hj_18
资源简介:This demo nstrates the use of the reversible jump MCMC simulated annealing for neural networks. This algorithm enables us to maximise the joint posterior distribution of the network parameters and the number of basis function. It performs a...
上传时间: 2015-07-19
上传用户:ma1301115706
资源简介:This code in this directory implements the binary hopfield network. Source code may be found in HOPNET.CPP. A sample training file is H7x8N4.trn. Sample test pattern files are: H7x8D4.TST, H5x8D7.TST, H5x8D7.TST and H5x8D9.TST, Output of...
上传时间: 2014-01-16
上传用户:123啊
资源简介:Streaming refers to the ability of an application to play synchronised media streams like audio and video streams in a continuous way while those streams are being transmitted to the client over a data network.
上传时间: 2015-10-22
上传用户:athjac
资源简介:Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software i...
上传时间: 2014-08-01
上传用户:zhaiyanzhong