Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - NSA
Search - NSA - List
这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection area. Please advise!
Update : 2008-10-13 Size : 1.35kb Publisher : HaicoLi

否定选择算法
Update : 2008-10-13 Size : 1.35kb Publisher : songyujiang

DL : 0
这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection area. Please advise!
Update : 2025-02-17 Size : 1kb Publisher : HaicoLi

DL : 0
否定选择算法-Negative selection algorithm
Update : 2025-02-17 Size : 1kb Publisher : songyujiang

在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.-rootkit for linux
Update : 2025-02-17 Size : 263kb Publisher : kkk

areoiadnc jsbkgdnba. sv,nsa
Update : 2025-02-17 Size : 30kb Publisher : arun

DL : 0
 SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Update : 2025-02-17 Size : 1kb Publisher : 陈诚

DL : 0
否定选择算法的仿真 希望大家能好好学习 好东西和大家分享-Negative selection algorithm for the simulation of hope that we can learn good things and to share
Update : 2025-02-17 Size : 1kb Publisher : Eric Zheng

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Update : 2025-02-17 Size : 3kb Publisher : patataman

SELinux的全称是Security-Enhanced Linux,是由美国国家安全局NSA开发的访问控制体制。SELinux可以最大限度地保证Linux系统的安全。此pdf文件包含了SElinux的详细介绍。-The full name of SELinux is Security-Enhanced Linux, is by the United States National Security Agency NSA access control system development. SELinux can be guaranteed to maximize the safety of Linux systems. This pdf file contains the SElinux introduction.
Update : 2025-02-17 Size : 434kb Publisher : dupeng

基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
Update : 2025-02-17 Size : 1kb Publisher : zhao

DL : 0
Negative Selection Agorithm 1. we have a signal which we ll monitor 2. we produce lymphocytes - length lyphocyte as a signal, we take random numbers 3. NSA... we check that lymphocyte is different from signal, if not we random another 4. now we monitor signal, if any value of signal is the same or nearest to lyphocyte - we have anomaly. -Negative Selection Agorithm 1. we have a signal which we ll monitor 2. we produce lymphocytes- length lyphocyte as a signal, we take random numbers 3. NSA... we check that lymphocyte is different from signal, if not we random another 4. now we monitor signal, if any value of signal is the same or nearest to lyphocyte- we have anomaly.
Update : 2025-02-17 Size : 8kb Publisher : Tom

DL : 0
SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
Update : 2025-02-17 Size : 3.32mb Publisher : 张万东

DL : 0
In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
Update : 2025-02-17 Size : 11kb Publisher : Santine

DL : 0
该算法包含两部分,一是检测器生成,一是测试阶段。-The algorithm consists of two parts, one detector generation, first beta.
Update : 2025-02-17 Size : 1kb Publisher : Harold Sheng

DL : 0
In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Update : 2025-02-17 Size : 4kb Publisher : monica1987is

DL : 0
采用经典的阴性选择算法N-NSA,用IRIS数据集对算法进行耐受和检测,检测器半径固定不变,检测效率不高,因此需要采用变半径的方法检测-The negative selection algorithm using the classical N-NSA, with the IRIS data set of algorithms for tolerance and detection, the detector radius is fixed, detection efficiency is not high, requiring the use of variable radius method to detect
Update : 2025-02-17 Size : 36kb Publisher : zy

DL : 0
负向选择算法的一个例子,它的基本思想就是通过采集正常数据集合生成检测器集,然后将待测数据与抗体集合中全部元素进行匹配计算,如与任一元素的匹配达到一定阈值,即判断该数据异常。-An example of negative selection algorithm. The basic idea is to collect the normal data set generated by the detector set, and then tested the data collection with the antibody to match all the elements of calculation, if any element of the match reaches a certain threshold, that determine the data exception.
Update : 2025-02-17 Size : 1kb Publisher : yht

DL : 0
基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
Update : 2025-02-17 Size : 1kb Publisher : ernscou

DL : 0
nsa算法,是人工免疫系统反向选择算法的java实现-NSA algorithm is the Java implementation of reverse selection algorithm for artificial immune system
Update : 2025-02-17 Size : 5kb Publisher :
« 12 3 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.