Maxing Technologies of Neural and Decision Tree Distinguish Behavior of Attach of Packet

碩士 === 元智大學 === 資訊管理學系 === 95 === Network architecture is more and more complicated day by day, in addition, the flourishing development of the internet and network activity are frequent, it is a serious threat to network security for the hostile package hidden in the network . Data mining is a hot...

Full description

Bibliographic Details
Main Authors: Chen Wen Hsien, 陳文賢
Other Authors: 劉俞志
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/98608191947904696173