insipid 发表于 2025-3-28 17:21:34

http://reply.papertrans.cn/47/4653/465285/465285_41.png

CLOT 发表于 2025-3-28 22:34:26

SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks Wireless Sensor Networks (WSN) because of the nature of WSN (e.g. self-origination, resource-constraint, etc). In this paper, we propose a kind of three-logic-layer architecture of Intrusion Detection System (IDS)-SAID by employing the agent technology and thought of immune mechanism. It has two wo

吵闹 发表于 2025-3-29 02:07:54

http://reply.papertrans.cn/47/4653/465285/465285_43.png

circumvent 发表于 2025-3-29 06:25:35

sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification of intrusion detection model (e.g. detection rules) is as important as detection accuracy. In this paper, a method sIDMG is proposed for small-size intrusion detection model generation by using our classification algorithm sC4.5. We also propose an algorithm sC4.5 for small-size decision tree induc

photophobia 发表于 2025-3-29 10:29:48

http://reply.papertrans.cn/47/4653/465285/465285_45.png

Ankylo- 发表于 2025-3-29 15:03:30

http://reply.papertrans.cn/47/4653/465285/465285_46.png

acrobat 发表于 2025-3-29 18:47:52

http://reply.papertrans.cn/47/4653/465285/465285_47.png

Ordnance 发表于 2025-3-29 22:42:26

http://reply.papertrans.cn/47/4653/465285/465285_48.png

结合 发表于 2025-3-30 02:59:17

Deployment of Virtual Machines in Lock-Keeper high-level security for a sensitive internal network by completely separating it with the less secure external network. The data exchange between the two separated networks is accomplished by the Lock-Keeper Secure Data Exchange software which is occupied by three PC-based Lock-Keeper components: I

昏暗 发表于 2025-3-30 04:13:33

http://reply.papertrans.cn/47/4653/465285/465285_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Applications; 7th International Wo Jae Kwang Lee,Okyeon Yi,Moti Yung Conference proceedings 2007 Springer-Verlag Berli