-
-
PursuitEvasionGames.rar
We model the hunt as a game of three explicit stages: the stalk, the attack,
and the subdual. We implemented this model in Matlab to simulate a
velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
-
TheGeometryandtheGameTheory.rar
We model the hunt as a game of three explicit stages: the stalk, the attack,
and the subdual. We implemented this model in Matlab to simulate a
velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
-
-
AnAnomalyBasedApproachforIntrusion.zip
A new system for web attack detection is presented. It
follows the anomaly-based approach, therefore known and
unknown ... . Any request which deviates from the
normal behavior is considered an attack. The system has been
applied to protect a real web ...
-
AudioWatermarking.zip
A local extremum of audio watermarking algorithm, matlab software watermark embedding and extraction operation, also gives some common attack method of audio watermarking attacks.
-
-
-
-
-
Recognition_of_hackers.zip
... Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not ...
-