About 156 item dissertation in line with Network Intrusion query results,the following is 1 to 50(Search took 0.034 seconds)

  1. Research on Key Technologies of Intrusion Detection for Wireless Sensor Network,FuRongRong/Beijing Jiaotong University,0/149
  2. Research on Misuse Type of Network Intrusion Detection Technology Based CBR Theory,HuangZheJing/PLA Information Engineering University,0/20
  3. Research and Implementation on Dynamic Load-Balancing Strategy in High-Speed Network for Intrusion Detection System,ZhangYaLing/Hunan University,0/9
  4. Resarch of Network Intrusion Detection Algorithms Based on Improved SVM,ZhaoChunLan/Xi'an University of Science and Technology,0/75
  5. Study of the Pattern Matching Algorithm in the Network Intrusion Detecting System,SunHuiRu/Xi'an University of Electronic Science and Technology,0/28
  6. Design and Implementation of Real-Time Intrusion Detection System Based on Immune Computation,WangYanTao/Xi'an University of Electronic Science and Technology,0/35
  7. Research on Pattern Matching Algorithm in Collaborative Intrusion Detection System,MaGaoLong/Beijing University of Posts and Telecommunications,0/30
  8. Study on Intrusion Detection with Qpso Optimized Bp Network,HeWeiShan/Guangxi University,0/0
  9. Application of artificial neural network in Intrusion Detection System,SongZuo/University of Electronic Science and Technology,0/59
  10. Research of Intrusion Detection Techniques for High Speed Networks,SunBingTeng/Shandong University,0/79
  11. A Kind of Network Intrusion Detection Research Based on Rough Sets and Genetic Algorithm to Improve the SVM,ZhangXiaoQin/Shanxi Normal University,0/80
  12. Design and Implementation on a Distributed Intrusion Detection System Based on Snort,ZhangMuChuan/Beijing University of Technology,0/252
  13. Node Authentication and Security Detection of Wireless Sensor Network,HuangJian/University of Science and Technology of China,0/677
  14. The Theory and Application of Particle Swarm Optimization Algorithm Based on Chaos,TangXianLun/Chongqing University,8/1789
  15. The Theory and Application of Particle Swarm Optimization Algorithm Based on Chaos,TangXianLun/Chongqing University,12/1835
  16. Network collaborative intrusion response fast recovery technology research and independent accident,LiZhongHua/Northwestern Polytechnical University,0/339
  17. Research and Application on Multi-Granularity Immune Network,ZhangJian/Northwestern Polytechnical University,3/370
  18. Research on Intrusion Detection Technology for Clustering Mobile Ad Hoc Network,FengJianXin/Northeastern University,3/550
  19. Researches on Theories and Key Technologies of Information Security Operation in Network Environment,JiangJianChun/Institute of Software,5/1209
  20. Research of Security Architecture of IP Layer and Its Practice,TanXingLie/Sichuan University,10/611
  21. Research on Network Intrusion Detection Based on Data Mining,LiuYongGuo/Chongqing University,13/887
  22. Researches on High-Speed Processing for Network Intrusion Detection Systems,ChenYiJiao/National University of Defense Science and Technology,9/505
  23. Research on High-speed Network Intrusion Detection Based on Imbalanced Data Sets Classification,ZhaoYueAi/Taiyuan University of Technology,3/312
  24. Online Adaptive Network Anomaly Detection System,WeiXiaoTao/Beijing Jiaotong University,0/192
  25. Open source network intrusion detection system snort detection algorithm,ChenXiaoYin/Nanjing University of Technology and Engineering,2/227
  26. Application and Research of Adaptive Immune Network Intrusion Detection Model,FuYuZhen/Taiyuan University of Technology,2/117
  27. Research of Network Intrusion Detection System Based on Immune Mechanism,ZhangGuoFu/Guangdong University of Technology,2/114
  28. Research on Network Threat and Security Technology for IPv6,LiuShiJie/PLA Information Engineering University,2/242
  29. Research and Application on Hierarchical Intrusion Detection Technologies in Intrusion Protection,LiuXiaoLiang/Shanghai Jiaotong University,0/161
  30. The IDS-based Computer Crime Evidence Dynamic Forensics Technology Research,WuZuo/Jilin University,4/225
  31. The Mixed Intrusion Detection System Based on Immunology,CuiMengMeng/Nanjing University of Information Engineering,2/112
  32. Research on the Intrusion Detection Method Based on Takagi-Sugeno Fuzzy Neural Network,BoMingZuo/Harbin University of Science and Technology,2/240
  33. Based on the principle of biological immune intrusion detection research,YuXiang/Nanjing University of Technology and Engineering,2/163
  34. Research for Fuzzy Intrusion Detection System in Mobility Ad Hoc Networks Based on Cluster,ZuBaoMing/Jiangsu University,2/114
  35. Research on the Network Intrusion Forensics System Base on Data Mining,DuXu/Guangdong University of Technology,4/231
  36. Research on Trojan Program Mechanism and Defending Measure,LvYou/Beijing University of Posts and Telecommunications,6/758
  37. Research and Implementation of Intrusion Detection System on Distributed High-speed Network,ZhangFeng/Shantou University,1/119
  38. SVM - based network intrusion detection,CaoHongZuo/Nanjing University of Technology and Engineering,8/234
  39. A Research About the Network Information Security of Electronic Government Affair,YouYinHui/Tianjin University,7/750
  40. Research and Implementation of Hi-Speed Network Intrusion Detection System Based on Bank Applications,LiJinGuo/Hunan Normal University,0/117
  41. A distributed network intrusion detection system - design of DNIDS and,LiuJinFeng/Dalian University of Technology,1/126
  42. Design & Implementation of Network Intrusion Detection System Based on Load Balance,DingHuiLin/Xi'an University of Electronic Science and Technology,1/183
  43. A Security Solution of the Special Campus Network,YuChengHang/Sichuan University,6/396
  44. High-speed Ethernet -based Intrusion Detection System,ZhangHongDa/Dalian University of Technology,1/108
  45. Distributed network intrusion detection system based on intelligent,WuXiaoNan/Northwestern University,8/173
  46. Network Intrusion Detection Model Based on Active Counterwork Response,ZhangXiaoMei/Taiyuan University of Technology,3/154
  47. Intrusion Detection Techniques and Application,MiJinLiang/Xi'an University of Architecture and Technology,4/346
  48. Study on the Network Intrusion Detection Approach Based on the Pattern Matching and Data Mining,LuXiaoMing/Guangxi University,0/310
  49. Research of Intrusion Detection System and Implement of Anti SYN Flood,ChengJin/University of Electronic Science and Technology,0/140
  50. The Analysis, Compare and Improvement of Detection Method of Network Intrusion Detection System,ChengWen/Southwest Jiaotong University,4/339

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile