搜索资源列表
21
- XYCMS企业建站系统是以asp+access进行开发的企业建站系统。 网站功能: 安全性:防SQL注入,自动锁定入侵的IP地址,防XSS攻击,具有很好的过滤系统(XYCMS enterprise site establishment system is an enterprise site establishment system developed by asp+access. Website function: Secur
后台黑站教程
- 利用代刷网后台后门黑站,入侵教程及源代码下载,附带上视频!(Backstage black station, intrusion tutorials and source code)
ARP入侵攻击器
- ARP入侵攻击器,内含源码及exe文件,仅供测试使用(ARP intrusion attack device, containing source code and exe files, for testing purposes only)
IDS
- 利用增强型K-means聚类算法实现入侵检测系统模型的设计(Design of Intrusion Detection System Model Using Enhanced K-means Clustering Algorithms)
KDD99-SVM
- 根据SVM,基于向量机算法的入侵检测系统,依托的是KDD99数据集(According to SVM, the intrusion detection system based on vector machine algorithm relies on KD99 data set.)
黑客安全手册-系统维护与渗透 min
- 阻止入侵和攻击的主要技术措施包括访问控制技术、防火墙技术、入侵检测技术、安全扫描、安全审计和安全管理。在网络安全整体解决方案日益流行的今天,安全审计是网络安全体系中的一个重要环节。 计算机网络安全审计主要包括对操作系统、数据库、Web、邮件系统、网络设备和防火墙等项目的安全审计,以及加强安全教育,增强安全责任意识。(The main technical measures to prevent intrusion and attack
How-to-process-KDD-99-dataset-master
- kdd cup99 数据集,一种用来做入侵检测的数据集。并附代码处理。(KDD CUP99 data set, a data set used for intrusion detection. Code processing is attached.)
UNSW_NB15_RNN
- 用UNSW数据集进行入侵检测,运用各种组合模型,精确度能达到90%以上,运用比较流行的神经网络模型分别进行了测试(Intrusion detection using UNSW dataset)
Cybersecurity Strategy Implementation2
- The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Cybersecurity Strategy Implementation3
- An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
Cybersecurity Strategy Implementation6
- Knowing what the attacker's Intrusion Kill Chain looks like can help defenders make it much harder for attackers to be successful.
Cybersecurity Strategy Implementation7
- One consideration before implementing this fr a mework is whether defenders should use the original Intrusion Kill Chain fr a mework or update it. There are several ways this fr a mework can be modernized. I'll give y
Cybersecurity Strategy Implementation8
- Another modification to this approach worth considering is whether to update the phases and the actions in the Courses of Action Matrix. For example, the Reconnaissance phase of the Intrusion Kill Chain can be split i
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence
- The cybersecurity community is slowly leveraging machine learning (ML) to combat ever-evolving threats. One of the biggest drivers for the successful adoption of these models is how well domain experts and users can un