资源列表
[编程文档] BackTrack-5-Wireless-Penetration-Testing---2011.r
说明:Wireless Networks have become ubiquitous in today s world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.<ahmed > 在 2025-07-13 上传 | 大小:12.72mb | 下载:0
[编程文档] Social-Network-Analysis-in-Construction-(PDF)
说明:This book responds to, and builds upon, two previous books: The Management of Complex Projects: A Relationship Approach and Collaborative Relationships in<ahmed > 在 2025-07-13 上传 | 大小:2.47mb | 下载:0
[行业发展研究] Detection-of-Syn-Flooding-Attacks-using-Linear-Pr
说明:This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp<ahmed > 在 2025-07-13 上传 | 大小:3.36mb | 下载:0
[行业发展研究] Discrete-choice-analysis-of-spatial-attack-sites.
说明:This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo<ahmed > 在 2025-07-13 上传 | 大小:531kb | 下载:0
[行业发展研究] EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME
说明:Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. Location prediction is a sp<ahmed > 在 2025-07-13 上传 | 大小:443kb | 下载:0
[行业发展研究] GAPatrol--An-Evolutionary-Multiagent-Approach-for
说明:In this work, we present a novel evolutionary multiagent-based simulation tool, named as GAPatrol. Such system is devoted to the specification of effective police patrol route strategies for coping with criminal activities happening in a given<ahmed > 在 2025-07-13 上传 | 大小:226kb | 下载:0
[行业发展研究] Insider-threat-mitigation--preventing-unauthorize
说明:This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as<ahmed > 在 2025-07-13 上传 | 大小:549kb | 下载:0
[行业发展研究] Internet-Threat-Detection--Prediction-and-Relevan
说明:With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnerable than ever, which b<ahmed > 在 2025-07-13 上传 | 大小:308kb | 下载:0
[行业发展研究] Mapping-crime--Understanding-hot-spots
说明:Much of crime mapping is devoted to detecting high-crime-density areas known as hot spots. Hot spot analysis helps police identify high-crime areas, types of crime being committed, and the best way to respond.<ahmed > 在 2025-07-13 上传 | 大小:1.05mb | 下载:0
[行业发展研究] New-tools-in-non-linear-modelling-and-prediction.
说明:In this paper we give an account of a new change of perspective in nonlinear modelling and prediction as applied to smooth systems. The core element of these developments is the Gamma test a non-linear modelling and analysis tool which allows u<ahmed > 在 2025-07-13 上传 | 大小:946kb | 下载:0
[行业发展研究] On-the-application-of-fuzzy-clustering-for-crime-
说明:One of the fundamental challenges in crime mapping and analysis is pattern recognition. Efforts and methods to detect crime hot-spots, or geographic areas of elevated criminal activity, are wide ranging<ahmed > 在 2025-07-13 上传 | 大小:820kb | 下载:0
[行业发展研究] Predicting-Housing-Value
说明:In this paper we show, by means of an example of its application to the problem of house price forecasting, an approach to attribute selection and dependence modelling utilising the Gamma Test (GT), a non-linear analysis algorithm that is describ<ahmed > 在 2025-07-13 上传 | 大小:326kb | 下载:0