Intrusion Detection Using Dynamic Sorting
碩士 === 逢甲大學 === 資訊工程所 === 92 === Today the network is widely used to transmit information and link user resources. However, there are many malicious activities under the network environment, such as hackers or Trojan horse programs attack. Although, many companies use firewall to defense the attack...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/13014335199767673641 |