Intrusion Detection Using Dynamic Sorting

碩士 === 逢甲大學 === 資訊工程所 === 92 === Today the network is widely used to transmit information and link user resources. However, there are many malicious activities under the network environment, such as hackers or Trojan horse programs attack. Although, many companies use firewall to defense the attack...

Full description

Bibliographic Details
Main Authors: Ren-Jye Lin, 林仁傑
Other Authors: Zone-Chang Lai
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/13014335199767673641