搜索资源列表
NSA
- 这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection are
COMPUTEG
- computes the gravitational acceleration vector at a specified % ECF location using the JGM2 gravitational ellipsoid only. % Higher-order gravity terms (the "gravity anomaly") are % ingnored. Only the pure ellipsoid
276
- 在现有的单层马尔科夫链异常检测模型基础上,提出一种崭新的两层模型.将性质上有较大差异的两个过程,不同的请求和同一请求内的系统调用序列,分为两层,分别用不同的马尔可夫链来处理.两层结构可以更准确地刻画被保护服务进程的动态行为,因而能较大地提高异常的识别率,降低误警报率.-In the existing single-layer Markov chain model for anomaly detection based on a new
0807
- 基于背景减除的时间差分法,可以有效的提取出前景,并且可以进行异常检测-Background subtraction based on the time difference method, can effectively extract the prospects, and anomaly detection can be
Prototype
- 视频异常检测 须安装jmf 参考论文 Robust Real-Time Unusual Event Detection-Video anomaly detection should be installed JMF reference papers Robust Real-Time Unusual Event Detection
qpso
- 在网络异常检测中,为了提高对异常状态的检测率,降低对正常状态的误判率,本文提出一种基于量子粒子群优化算法训练小波神经网络进行网络异常检测的新方法。利用量子粒子群优化算法(QPSO)训练小波神经网络,将小波神经网络(WNN)中的参数组合作为优化算法中的一个粒子,在全局空间中搜索具有最优适应值的参数向量。- In order to improve the detection rate for anomaly state and reduce
RX
- 此算法使用于单波段或者多波段图像中的非监督异常检测,性能很好~-The algorithm used in single-band or multi-band image unsupervised anomaly detection, performance very good ~
tdu70
- 重力异常的向上延拓程序,很实用,推荐地球物理学生学习-Gravity anomaly upward extension procedure is very useful, recommended geophysics students
p2ptrafficanomalydetection
- p2p异常流量检测,基于传输层特征检测,能检测出基本P2P应用所产生的P2P流量-p2p traffic anomaly detection
KRLS
- Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
ziyuanfenxi
- 这是一个对运行程序进行内存资源分析的软件,是进行软件破解,运行动态跟踪,汉化,异常纠错的好帮手,个人认为挺实用,希望对大家有所帮助-This is a process of memory resources to run the analysis software, the software is cracked, run the dynamic tracking, localization, anomaly correction ha
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as n
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection
protocol-anomaly-detection-network-based-intrusio
- A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main cat
ids
- For anomaly detection
wavelet_time_entropy
- 结合小波变换和香农定理,介绍了小波时间熵算法,并引用于信号异常检测中-Wavelet transform and the Shannon theorem, introduced the wavelet time entropy algorithm, and applied Signal Anomaly Detection
anomaly
- 移动对象轨迹异常检测算法代码,适合研究人员使用,-Track moving objects anomaly detection algorithm code
Gravity-anomaly-contour
- 重力异常平面等值线图和剖面立体图 布格重力异常值,绘出平面等值线图,等值线距为0.5mGal;-Gravity anomaly contour map plane
CUMULATIVE-ANOMALY
- 计算时间序列的累积距平,可以分析气象要素时间变化特征。FORTRAN语言。-THIS IS A PROGRAM FOR CALCULATING CUMULATIVE ANOMALY OF A TIME SERIES.
System-Anomaly-Detection-Mining-Firewall
- this about detection anomaly on firewa-this is about detection anomaly on firewall