| ²é¿´: 333 | »Ø¸´: 2 | ||
lc52236025гæ (³õÈëÎÄ̳)
|
[ÇóÖú]
ÇóÖúѽÇóÖú¡¤¼±Ñ½¼±:ÇóIstP¼ìË÷ºÅ¡¤Ð»Ð»´ó¼ÒÁË
|
|
ÂÛÎÄÌâÄ¿ 1 Research and Simulation of Network Intrusion Detection Algorithm Based on Fuzzy Classification 2 Design method of campus network structure robustness |
» ²ÂÄãϲ»¶
»¯Ñ§µ÷¼ÁÇóÖú
ÒѾÓÐ14È˻ظ´
²ÄÁÏÀà284µ÷¼Á
ÒѾÓÐ12È˻ظ´
²ÄÁÏ¿¼ÑÐÇóµ÷¼Á×Ü·Ö280
ÒѾÓÐ31È˻ظ´
325·Ö»¯Ñ§µ÷¼Á
ÒѾÓÐ9È˻ظ´
Óб¬ÁÏ£¬Ò»¸öÇàÄê½ÌʦÂô·¿µÃ400Íò£¬È»ºó»»ÁËÒ»¸öËÄÇàñ×Ó
ÒѾÓÐ4È˻ظ´
Ò»Ö¾Ô¸211£¬0703»¯Ñ§305·ÖÇóµ÷¼Á
ÒѾÓÐ21È˻ظ´
0703»¯Ñ§µ÷¼Á 348·Ö
ÒѾÓÐ15È˻ظ´
0703»¯Ñ§Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
368»¯Ñ§Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
±¾¿Æ211£¬293·ÖÇëÇóµ÷¼Á
ÒѾÓÐ12È˻ظ´
lc52236025
гæ (³õÈëÎÄ̳)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 200.5
- ºì»¨: 1
- Ìû×Ó: 14
- ÔÚÏß: 21.1Сʱ
- ³æºÅ: 3521985
- ×¢²á: 2014-11-06
- רҵ: ¼ÆËã»úÍøÂç
2Â¥2015-09-01 23:09:28
lc52236025
гæ (³õÈëÎÄ̳)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 200.5
- ºì»¨: 1
- Ìû×Ó: 14
- ÔÚÏß: 21.1Сʱ
- ³æºÅ: 3521985
- ×¢²á: 2014-11-06
- רҵ: ¼ÆËã»úÍøÂç
3Â¥2015-09-04 00:34:59














»Ø¸´´ËÂ¥