下载  >  安全技术  >  网络攻防  > intrusion detection and correlation

intrusion detection and correlation 评分:

入侵检测与关联分析的经典英文书籍以及整本书的个人学习后做的中文PPT,是入侵检测和关联分析的经典之作,希望有所帮助。

...展开详情
2009-05-12 上传 大小:4.35MB
举报 收藏
分享
Intrusion Detection with SNORT advanced IDS techniques

Intrusion Detection with SNORT advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID

立即下载
Network Intrusion Detection using Deep Learning_A Feature Learning Approach

Network Intrusion Detection using Deep Learning_A Feature Learning Approach-Springer(2018).pdf

立即下载
intrusion detection and correlation

入侵检测与关联分析的经典英文书籍以及整本书的个人学习后做的中文PPT,是入侵检测和关联分析的经典之作,希望有所帮助。

立即下载
Snort Intrusion Detection and Prevention Toolkit

Snort IDS and IPS Toolkit 769 pages Snort Intrusion Detection and Prevention Toolkit

立即下载
Anomaly-based network intrusion detection

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are

立即下载
Intrusion Detection: Network Security beyond the Firewall

Introduction Preface Acknowledgments PART 1—Before Intrusion Detection: Traditional Computer Security Chapter 1—Intrusion Detection and the Classic Security Model Back to Basics: The Classic Security Model Goals of Computer Security Learn to Ask Tough Questions A Basic Computer Security Mo

立即下载
Snort 2.0 Intrusion Detection.rar

Snort 2.0 Intrusion Detection.rar

立即下载
Snort 2.1 Intrusion Detection.pdf

Snort 2.1 Intrusion Detection.pdf

立即下载
Intrusion Detection Evaluation Dataset (CICIDS2017)

这是Intrusion Detection Evaluation Dataset (CICIDS2017)数据集中星期五所测得数据,其余4天数据可以私聊我,可能会收点手工费,毕竟国外实验室的数据集难搞。

立即下载
The Tao of Network Security Monitoring Beyond Intrusion Detection

The Tao of Network Security Monitoring Beyond Intrusion Detection By Richard Bejtlich Pages : 832 英文

立即下载
Intrusion Detection in Wireless__ Ad-Hoc Networks

Intrusion Detection in Wireless__ Ad-Hoc Networks

立即下载
Snort 2.1 Intrusion Detection(Second Edition).rar

Snort 2.1 Intrusion Detection(Second Edition).rar

立即下载
A Virtual Machine Introspection Based Architecture for Intrusion Detection

提出了VMI的概念,在这篇论文中这样定义VMI:以分析虚拟机中运行的软件为目的,在虚拟机外部监测虚拟机的方法。

立即下载
Cisco Networking Academy - CCSP - IDS - Cisco Secure Intrusion Detection System 2.1 课件

Cisco Networking Academy - CCSP - IDS - Cisco Secure Intrusion Detection System 2.1

立即下载
Fair Resource Allocation in an Intrusion Detection System for Edge Computing

该论文介绍了边缘计算中,入侵检测系统资源公平分配方案。

立即下载
Based on Data Mining for Network Intrusion Detection System Design and Implementation

基于数据挖掘技术的入侵检测系统的设计理路和模型

立即下载
复杂网络中的合作式IDS(英文原名Cooperative Intrusion Detection System(CIDS) in Grid Enivronment)

Cooperative Intrusion Detection System(CIDS) in Grid Environment Dahlan的CIDS论文,阐述了在Grid Environment环境下搭建合作式的IDS以及其优势。 看看外国人的思维吧!

立即下载
A Deep Learning Approach to Network Intrusion Detection

Network intrusion detection systems (NIDSs) play a crucial role in defending computer networks. However, there are concernsregardingthefeasibilityandsustainabilityofcurrentapproacheswhenfacedwiththedemandsofmodernnetworks.More specifically, these concerns relate to the increasing levels of required h

立即下载
论文研究-Nearest Neighbors based Density Peaks Approach to Intrusion Detection.pdf

基于密度峰值的最近邻入侵检测方法,张浩,李丽香,入侵检测系统是网络安全的重要组成部分。然而,传统的入侵检测系统无法识别新型网络入侵,例如零日攻击。许多机器学习方法被用在��

立即下载
论文研究-The research of hierarchical intrusion detection techniques in wireless sensor networks.pdf

无线传感器网络中分等级的入侵检测技术研究,张帅,张凤斌,为了满足无线传感器网络的不同应用领域对安全需求的不同,提出一种有两个防护等级的分等级入侵检测方案。第一等级防护基于规范进

立即下载