The analysis of anomalous packets by data mining
碩士 === 開南大學 === 資訊學院碩士在職專班 === 106 === Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the...
Main Authors: | LU,KUN-YAN, 呂昆晏 |
---|---|
Other Authors: | HONG,GUO-MING |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/8m7279 |
Similar Items
-
Based on packet analysis to detect the use of publicnetwork mining Behavior- taking ETH as an example
by: LU, YU-HAN, et al.
Published: (2019) -
A Study of Mining User Behavior in Mobile Environments
by: Kun-Lin Lu, et al.
Published: (2007) -
Fair packet loss rate and emergency packet first simplify algorithm for WiMAX network
by: Yi-Xuan Lu, et al.
Published: (2018) -
Effects of packet aggregation on TCP performance
by: Jia-ying Lu, et al.
Published: (2006) -
Propagation Analysis and Data Packet Dropout Compensation
by: Tong Xuan Quang, et al.
Published: (2013)