tcl network programming
2022-02-15 22:39:37 14.24MB tcl network programming
1
储存库(v0.2.3) 一个简单而灵活的代码,用于诸如Echo State Networks(ESN)之类的储层计算架构。 ReservoirPy是一个基于Python科学模块的简单易用的库。 它提供了灵活的接口来实现高效的储层计算(RC)架构,尤其侧重于回声状态网络(ESN)。 与基本的Python实现相比,ReservoirPy的高级功能可提高简单笔记本电脑上的计算时间效率。 它的一些功能包括:脱机和在线培训,并行实现,稀疏矩阵计算,快速频谱初始化等。此外,还包括图形工具,可借助hyperopt库轻松地探索超参数。 该库适用于Python 3.6及更高版本。 官方文件 请参阅以了解有关ReservoirPy的主要功能,其API和安装过程的更多信息。 实例和教程 以获取安装,示例,教程和Jupyter Notebooks。 版本号 要启用ReservoirPy的最新功能,您米格思想
2022-02-15 16:18:49 3.67MB python machine-learning timeseries neural-network
1
Support for U2020 X-Series USB Power Sensors Delta Match Calibration required on ALL N5231A, N5232A, and N5239A models. Unguided TRL Cal allowed on all PNA 4-port models Noise Parameters
2022-02-14 20:07:20 12.77MB PNA
1
Nmap Cookbook The Fat-free Guide to Network Scanning.pdf
2022-02-13 10:54:29 2.36MB Nmap Cookbook
1
Nmap Network Scanning官方资源完全版 高清PDF 免积分网盘下载(我级别不够上传大文件) 为开源中国贡献力量!
2022-02-13 10:52:42 249B Nmap
1
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings By 作者: Ehab Al-Shaer – Jinpeng Wei – Kevin W. Hamlen – Cliff Wang ISBN-10 书号: 3030021092 ISBN-13 书号: 9783030021092 Edition 版本: 1st ed. 2019 出版日期: 2019-01-02 pages 页数: (235 ) $84.99 This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. Cover Front Matter Part I. Cyber Deception Reasoning Frameworks 1. Using Deep Learning to Generate Relational HoneyData 2. Towards Intelligent Cyber Deception Systems 3. Honeypot Deception Tactics Part II. Dynamic Decision-Making for Cyber Deception 4. Modeling and Analysis of Deception Games Based on Hypergame Theory 5. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception Part III. Network-Based Deception 6. CONCEAL:A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment 7. WetShifter:A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution 8. Deception-Enhanced Threat Sensing for Resilient Intrusion Detection 9. HONEYSCOPE: IoT Device Protection with Deceptive Network Views Part IV. Malware Deception 10. gExtractor: Automated Extraction of Malware Deception Parameters for Autononous Cyber Deception 11. Malware Deception with Automatic Analysis and Generation of HoneyResource
2022-02-12 15:26:40 6.47MB network
1
纳奥 基于 for Unity的神经网络Ambien遮挡。 产品特点 双边模糊(具有正常和深度阈值) 时间平滑 下采样和双边上采样 此限制使用CommandBuffers写入GBuffer,从而实现仅Ambien模式。 该项目包括Unity的传统电影效果和进行比较。 要求 Unity 2017.1.0f3及更高版本 DirectX 11 屏幕截图 使用NNAO: 没有NNAO: 仅NNAO: 使用NNAO: 没有NNAO: 仅NNAO:
2022-02-11 14:49:05 54.73MB unity graphics shader unity3d
1
官网已经下载不到了。这个亲测可用。适用于hp usb network print adapter
2022-02-08 09:12:04 40.92MB 惠普 打印共享器 network print
1
TensorLayer中的DCGAN 这是的TensorLayer实现。 寻找文本到图像合成? :NEW_button: :fire: 2019年5月:我们只是更新了此项目以支持TF2和TL2。 请享用! :NEW_button: :fire: 2019年5月:该项目被选为TL项目的默认模板。 先决条件 的Python3.5 3.6 TensorFlow == 2.0.0a0 pip3 install tensorflow-gpu==2.0.0a0 TensorLayer = 2.1.0 pip3 install tensorlayer==2.1.0 用法 首先,将对齐的面部图像从或到data文件夹。 其次,训练GAN: $ python
1
Certified Pre-sales Associate IP Network Datacom认证题.docx
2022-02-06 09:05:29 38KB tcp/ip 网络协议 网络