You are on page 1of 1

Developing A Java Based Network Intrusion Detection System (IDS)

- Network Intrusion
- Intrusion Detection Systems (IDS) Overview
- Need for an IDS
- Requirements For IDS
- Creating Diagram for PacketCapture
- Creating Diagram for IntrusionAttacks

Hurst Index Estimation for Self-similar processes with Long-Memory- Hurst parameter
Estimators - R/S Estimator
- Methods of estimating the Hurst exponent- Hurst parameter - Estimator based on
Discrete Variations
- Modelling of fractal Brownian motion
- Implementing Hurst Estimation for Self-Similiarity using Java

You might also like