资源列表
[编程文档] WDM-CWDM-DWDM-Segmentation-Primer
说明:WDM CWDM DWDM Segmentation Primer<ahmed > 在 2024-11-18 上传 | 大小:1.19mb | 下载:0
[编程文档] BackTrack-5-Wireless-Penetration-Testing---2011.r
说明:Wireless Networks have become ubiquitous in today s world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work<ahmed > 在 2024-11-18 上传 | 大小:12.72mb | 下载:0
[编程文档] Social-Network-Analysis-in-Construction-(PDF)
说明:This book responds to, and builds upon, two previous books: The Management of Complex Projects: A Relationship Approach and Collaborative Relationships in<ahmed > 在 2024-11-18 上传 | 大小:2.47mb | 下载:0
[行业发展研究] Detection-of-Syn-Flooding-Attacks-using-Linear-Pr
说明:This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection<ahmed > 在 2024-11-18 上传 | 大小:3.36mb | 下载:0
[行业发展研究] Discrete-choice-analysis-of-spatial-attack-sites.
说明:This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously<ahmed > 在 2024-11-18 上传 | 大小:531kb | 下载:0
[行业发展研究] EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME
说明:Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problem<ahmed > 在 2024-11-18 上传 | 大小:443kb | 下载:0
[行业发展研究] GAPatrol--An-Evolutionary-Multiagent-Approach-for
说明:In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal acti<ahmed > 在 2024-11-18 上传 | 大小:226kb | 下载:0
[行业发展研究] Insider-threat-mitigation--preventing-unauthorize
说明:This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines vari<ahmed > 在 2024-11-18 上传 | 大小:549kb | 下载:0
[行业发展研究] Internet-Threat-Detection--Prediction-and-Relevan
说明:With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more v<ahmed > 在 2024-11-18 上传 | 大小:308kb | 下载:0
[行业发展研究] Mapping-crime--Understanding-hot-spots
说明:Much of crime mapping is devoted to detecting high-crime-density areas known as hot spots. Hot spot analysis helps police identify high-crime areas, types of crime being committed, and the best way to respond.<ahmed > 在 2024-11-18 上传 | 大小:1.05mb | 下载:0
[行业发展研究] New-tools-in-non-linear-modelling-and-prediction.
说明:In this paper we give an account of a new change of perspective in nonlinear modelling and prediction as applied to smooth systems. The core element of these developments is the Gamma test a non-linear modelling and<ahmed > 在 2024-11-18 上传 | 大小:946kb | 下载:0