- 
 
					
			- 
                
			
 
				
			- 
                
					ippl-0.13.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					netguard-1.0.0.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					jail-1.5.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					protolog-1.0.0.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					ng-0.0.2.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					portsentry-0.90.tar.gz
					network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
				 
			 
				
			- 
                
					Battle_with_monster.zip
					You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
				 
			 
				
			- 
                
					Design.rar
					sending intrusion detection for A wireless Intrusion detection system and a new attack model
				 
			 
				
			- 
                
					vm.zip
					 ... 
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for ... 
				 
			 
					-