没有合适的资源?快使用搜索试试~
我知道了~
文库首页
安全技术
网络安全
The Challenges in SDN/ML Based Network Security A Survey
The Challenges in SDN/ML Based Network Security A Survey
机器学习
SDN
需积分: 10
1 下载量
191 浏览量
2018-09-11
23:04:26
上传
评论
收藏
820KB
PDF
举报
温馨提示
立即下载
The Challenges in SDN/ML Based Network Security A Survey-论文
资源推荐
资源评论
Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications
浏览:14
本书重点介绍了安全性在基于软件定义网络(SDN)和网络功能虚拟化(NFV)的系统的设计,开发和部署中的重要性,这些系统被称为SDNFV。该内容涵盖了SDNFV背景下安全机制应用的综合指南,涵盖了未来网络中的基础理论,...
Face Recognition: A Novel Multi-Level Taxonomy based Survey
浏览:105
Abstract: In a world where security issues have been gaining growing importance, face recognition systems have attracted increasing attention in multiple application areas, ranging from forensics and
Network security with OpenSSL
浏览:173
5星 · 资源好评率100%
The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.
Anomaly-based network intrusion detection
浏览:124
In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. However, despite the variety of ..
The Future Security Challenges in RFID.pdf
浏览:45
The Future Security Challenges in RFID.pdf
A Survey of the Recent Architectures of Deep Convolutional Neural Networks.pdf
浏览:12
Deep Convolutional Neural Networks (CNNs) are a special type of Neural Networks, which have shown state-of-the-art ...components and sheds light on the current challenges and applications of CNNs.
Security and Privacy Challenges in the Internet of Things
浏览:75
5星 · 资源好评率100%
Security and Privacy Challenges in the Internet of Things
CS Challenges of Artificial Intelligence in Autonomous Driving
浏览:85
ENISA-JRC Report - Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
Core Software Security: Security at the Source
浏览:151
5星 · 资源好评率100%
PRSA5: Security Architectural Reviews and Tool-Based Assessments of Current, Legacy, and M&A Products and Solutions Legacy Code Mergers and Acquisitions (M&As) Key Success Factors Deliverables ...
Internet of Things_Challenges, Advances, and Applications-CRC(2018).pdf
浏览:74
However, the chapters are organized in a way that provides a base to the readers by starting with basic concepts, followed by main challenges of IoT, and then the advanced topics. We also tried to ..
security and privacy in mobile social network challenges and solutions.pdf
浏览:143
security and privacy in mobile social network challenges and solutions.pdf
Cloud.Computing.Security.Foundations.and.Challenges
浏览:5
proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all ...
New Advances and Challenges of Fall Detection Systems: A Survey
浏览:193
一篇发表于2018年3月的文献综述,关于人的跌倒检测的最新研究和挑战。
Networking.for.Big.Data.1482263491
浏览:113
chapter 10 A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends chapter 11 Toward MapReduce-Based Machine-Learning Techniques for Processing Massive Network Threat
A taxonomy and survey on Green Data Center Networks
浏览:195
数据中心的研究综述,包括了最近几年的最新研究成果。Data centers are growing exponentially ...ongoing research in the broad domain of DCNs and highlights the challenges faced by the DCN research community.
A Berkeley View of Systems Challenges for AI
浏览:70
With the increasing commoditization of computer vision, speech ...architectures, and security that can address these challenges and help unlock AI’s potential to improve lives and society.
Security Strategies In Linux Platforms And Applications
浏览:150
This book is part of the Information Systems Security & ...position to solve the cybersecurity challenges not just of today, but of tomorrow as well. 介绍Linux平台的安全策略,英文原版,送给识货的人。
BurpLoaderKeygen.jar.zip
浏览:196
网络安全-02-BurpSuite工具详细安装教程 BurpSuite注册机下载激活-BurpSuite工具 将BurpLoaderKeygen.jar & burpsuite_pro_v2023.4.5.jar 放置同一目录下 3.3.2 cmd命令行执行 java -jar BurpLoaderKeygen.jar >java -jar BurpLoaderKeygen.jar
最新版ISO/IEC 27001:2022、ISO 27002:2022中英文合集
浏览:30
5星 · 资源好评率100%
ISO 27001:2022英文版 ISO 27001:2022中文版(本人译稿,再也不改了版) ISO 27002:2022英文版 ISO 27002:2022中文版(本人译稿,再也不改了版) 全部为文字版PDF文件,带完整目录标签。
Goby红队版-win-x64-2.4.7版本
浏览:135
Goby红队专版:集成1500个poc和exp ,覆盖普通版本所有功能,开箱即用 使用方式: 解压后双击goby.exe运行即可 注意事项: 最新的漏洞不可以在线更新,可自行添加poc和exp 重要的事情说三遍 不要用于非法或未授权测试! 不要用于非法或未授权测试! 不要用于非法或未授权测试! 自行判断可刑性!
Chrome Header Editor 插件
浏览:197
Chrome Header Editor 插件 及 配置文件,旨在取消因流量异常或IP异常导致的谷歌人机验证。
ISO SAE 21434-2021 中文版.pdf
浏览:179
4星 · 用户满意度95%
ISO SAE 21434中文版
OpenVAS GVM 中文翻译补丁
浏览:175
自己制作的粗糙版 放入/usr/share/gvm/gsad/web/locales目录刷新浏览器即可
2024 dy最新a-bogus
浏览:118
最新长ab纯JS算法, 最新a_bogus参数逆向分析及插桩调试技巧
安全认证cisp教材全套
浏览:68
5星 · 资源好评率100%
cisp教材全套,最全的CISP电子版教材,总共20章节分20个PDF文件
软件工程导论(第六版)课后习题答案1
浏览:197
5星 · 资源好评率100%
第一章一、什么是软件危机?它有哪些典型表现?为什么会出现软件危机?软件危机是指在计算机软件开发、使用与维护过程中遇到的一系列严重问题和难题。它包括两方面:如何开
评论
收藏
内容反馈
立即下载
资源评论
资源反馈
评论星级较低,若资源使用遇到问题可联系上传者,3个工作日内问题未解决可申请退款~
联系上传者
评论
fatsheep666
粉丝: 0
资源:
1
私信
上传资源 快速赚钱
我的内容管理
展开
我的资源
快来上传第一个资源
我的收益
登录查看自己的收益
我的积分
登录查看自己的积分
我的C币
登录后查看C币余额
我的收藏
我的下载
下载帮助
前往需求广场,查看用户热搜
最新资源
51单片机使用OLED屏幕显示DS18B20温度值
归一化最完整总结!!!.txt
通过yarn建立vue程序,以及插件的添加
智能家居使用场景识别挑战赛【机器学习课程设计报告】
基于matlab GUI的图像处理项目源码.7z
网络爬虫实现爬取网页资源
一个简单的个人资金账户管理程序
160501_20161201064907.zip
一个简洁的Python实现,使用了字典来存储图的信息,并构建了一个函数 dijkstra 来找到源点到所有其他节点的最短路径
STM32输出PWM电压值
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功