Learn More
Distributed intrusion detection system as the supplement of firewall can provide more effective protection means. This article describes the development trend of Distributed Intrusion Detection System, Shortcomings of Distributed Intrusion Detection System, and describes in detail the advantages, the Structure and the Principle of work of Distributed(More)
Recent years, Intelligent Agent has become the powerful tools in developing electronic commerce system. Along with the development of intelligent Agent technique, we can design an intelligent e-commerce system. This paper briefly introduces the intelligent Agent technique and researches on the properties and principle of intelligent Agent, discusses the(More)
In view of the shortage of e-commerce sites for data mining system, Web Data Mining System Framework Based on Mobile Agent is proposed in this paper. In advantage of the independency, mobility and intelligence of mobile agent, the search process and the recommendation of the entire commodity have a higher timeliness and accuracy. Businesses can apply the(More)
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different(More)
In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed(More)
With the risk factor of network security continuously improving, firewalls, which once as a means of the most important safety precautions, can no longer satisfy people's demand for network security. As a complement of the firewall, Distributed Intrusion Detection System can effectively improve the security. This article describes the framework, the(More)
According to analysis development situation of the Construction enterprise, we can deduce the development of the construction industry in the region. This paper use factor analysis and analysis and comprehensive evaluation of index system which characterization of construction enterprise development. It can deduce the state of development of the(More)
As the fast development of the global information, Internet goes into the society; the economy; the culture and every corner in our life. The popularity of the e-commence gradually forms a global market and an international commercial network which can totally change people’ living way and the commercial function mode. The article is about the(More)