Welcome![Sign In][Sign Up]
Location:
Search - NSA

Search list

[Other resourceNSA

Description: 这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection area. Please advise!
Platform: | Size: 1380 | Author: HaicoLi | Hits:

[Other resourceNSA

Description: 否定选择算法
Platform: | Size: 1384 | Author: songyujiang | Hits:

[AI-NN-PRNSA

Description: 这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection area. Please advise!
Platform: | Size: 1024 | Author: HaicoLi | Hits:

[matlabNSA

Description: 否定选择算法-Negative selection algorithm
Platform: | Size: 1024 | Author: songyujiang | Hits:

[Linux-Unixrkhunter-1.3.2.tar

Description: 在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.-rootkit for linux
Platform: | Size: 269312 | Author: kkk | Hits:

[Documentsproject22_file1

Description: areoiadnc jsbkgdnba. sv,nsa
Platform: | Size: 30720 | Author: arun | Hits:

[JSP/Javasha1

Description:  SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Platform: | Size: 1024 | Author: 陈诚 | Hits:

[matlabNSA

Description: 否定选择算法的仿真 希望大家能好好学习 好东西和大家分享-Negative selection algorithm for the simulation of hope that we can learn good things and to share
Platform: | Size: 1024 | Author: Eric Zheng | Hits:

[JSP/Javasha256.java

Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: | Size: 3072 | Author: patataman | Hits:

[Linux-Unixselinux

Description: SELinux的全称是Security-Enhanced Linux,是由美国国家安全局NSA开发的访问控制体制。SELinux可以最大限度地保证Linux系统的安全。此pdf文件包含了SElinux的详细介绍。-The full name of SELinux is Security-Enhanced Linux, is by the United States National Security Agency NSA access control system development. SELinux can be guaranteed to maximize the safety of Linux systems. This pdf file contains the SElinux introduction.
Platform: | Size: 444416 | Author: dupeng | Hits:

[Internet-NetworkNSA

Description: 基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
Platform: | Size: 1024 | Author: zhao | Hits:

[matlabnsa

Description: Negative Selection Agorithm 1. we have a signal which we ll monitor 2. we produce lymphocytes - length lyphocyte as a signal, we take random numbers 3. NSA... we check that lymphocyte is different from signal, if not we random another 4. now we monitor signal, if any value of signal is the same or nearest to lyphocyte - we have anomaly. -Negative Selection Agorithm 1. we have a signal which we ll monitor 2. we produce lymphocytes- length lyphocyte as a signal, we take random numbers 3. NSA... we check that lymphocyte is different from signal, if not we random another 4. now we monitor signal, if any value of signal is the same or nearest to lyphocyte- we have anomaly.
Platform: | Size: 8192 | Author: Tom | Hits:

[CA authSHA1

Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
Platform: | Size: 3481600 | Author: 张万东 | Hits:

[CA authsha1

Description: In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
Platform: | Size: 11264 | Author: Santine | Hits:

[ExploitNSA

Description: 该算法包含两部分,一是检测器生成,一是测试阶段。-The algorithm consists of two parts, one detector generation, first beta.
Platform: | Size: 1024 | Author: Harold Sheng | Hits:

[CA authSHA256

Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: | Size: 4096 | Author: monica1987is | Hits:

[matlabN-NSA

Description: 采用经典的阴性选择算法N-NSA,用IRIS数据集对算法进行耐受和检测,检测器半径固定不变,检测效率不高,因此需要采用变半径的方法检测-The negative selection algorithm using the classical N-NSA, with the IRIS data set of algorithms for tolerance and detection, the detector radius is fixed, detection efficiency is not high, requiring the use of variable radius method to detect
Platform: | Size: 36864 | Author: zy | Hits:

[matlabNSA

Description: 负向选择算法的一个例子,它的基本思想就是通过采集正常数据集合生成检测器集,然后将待测数据与抗体集合中全部元素进行匹配计算,如与任一元素的匹配达到一定阈值,即判断该数据异常。-An example of negative selection algorithm. The basic idea is to collect the normal data set generated by the detector set, and then tested the data collection with the antibody to match all the elements of calculation, if any element of the match reaches a certain threshold, that determine the data exception.
Platform: | Size: 1024 | Author: yht | Hits:

[Game ProgramNSA

Description: 基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
Platform: | Size: 1024 | Author: ernscou | Hits:

[JSP/JavaNSA

Description: nsa算法,是人工免疫系统反向选择算法的java实现-NSA algorithm is the Java implementation of reverse selection algorithm for artificial immune system
Platform: | Size: 5120 | Author: | Hits:
« 12 3 »

CodeBus www.codebus.net