搜索资源列表
NSA
- 这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection are
NSA
- 否定选择算法
NSA
- 这个是人工免疫系统中的反向选择算法(Negative Selection Aglorithm)的编程实例,它主要用于异常检测方面。请多指教!-this artificial immune system is the inverse algorithm (A Negative Selection glorithm) programming examples, it was mainly used anomaly detection are
NSA
- 否定选择算法-Negative selection algorithm
rkhunter-1.3.2.tar
- 在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of t
project22_file1
- areoiadnc jsbkgdnba. sv,nsa
sha1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-
NSA
- 否定选择算法的仿真 希望大家能好好学习 好东西和大家分享-Negative selection algorithm for the simulation of hope that we can learn good things and to share
sha256.java
- Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands fo
selinux
- SELinux的全称是Security-Enhanced Linux,是由美国国家安全局NSA开发的访问控制体制。SELinux可以最大限度地保证Linux系统的安全。此pdf文件包含了SElinux的详细介绍。-The full name of SELinux is Security-Enhanced Linux, is by the United States National Security Agency NSA access
NSA
- 基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
nsa
- Negative Selection Agorithm 1. we have a signal which we ll monitor 2. we produce lymphocytes - length lyphocyte as a signal, we take random numbers 3. NSA... we check that lymphocyte is different from signal, i
SHA1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
sha1
- In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
NSA
- 该算法包含两部分,一是检测器生成,一是测试阶段。-The algorithm consists of two parts, one detector generation, first beta.
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processi
N-NSA
- 采用经典的阴性选择算法N-NSA,用IRIS数据集对算法进行耐受和检测,检测器半径固定不变,检测效率不高,因此需要采用变半径的方法检测-The negative selection algorithm using the classical N-NSA, with the IRIS data set of algorithms for tolerance and detection, the detector radius is fix
NSA
- 负向选择算法的一个例子,它的基本思想就是通过采集正常数据集合生成检测器集,然后将待测数据与抗体集合中全部元素进行匹配计算,如与任一元素的匹配达到一定阈值,即判断该数据异常。-An example of negative selection algorithm. The basic idea is to collect the normal data set generated by the detector set, and then
NSA
- 基于入侵检测的负选择算法,适合于初学者,可以快速了解负选择算法思想-NSA
NSA
- nsa算法,是人工免疫系统反向选择算法的java实现-NSA algorithm is the Java implementation of reverse selection algorithm for artificial immune system