Network invasion detection attack software open source opensourceJobs

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    24,097 network invasion detection attack software open source opensource jobs fundet, i prisklassen EUR

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [log ind for at se URL] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    €65 (Avg Bid)
    €65 Gns Bud
    1 bud

    ...here [log ind for at se URL] - Old website can be viewed here: [log ind for at se URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress template I've

    €322 (Avg Bid)
    €322 Gns Bud
    43 bud
    2mw ride sharing 6 dage left

    Want to add some features to existing opensource react native project.

    €154 (Avg Bid)
    €154 Gns Bud
    6 bud

    Residential and commercial plumbing company specialising in hot and cold water, sewerage and storm water,...cold water, sewerage and storm water, excavation, gas installation and repair, roofing repairs and replacement, drainage, cctv camera, downpipes, emergency plumbing, leak detection, water filtration, solar installation, gas leaks, wall cladding.

    €284 (Avg Bid)
    €284 Gns Bud
    48 bud

    ...specific angle to continue -- continuous check for gyroscope while running camera feed to ensure the specific angle stays the same for the camera feed capture process -- frame detection for when someone is completely still for 3 seconds (e.g. frame has minimal pixel changes for 3 seconds) --primary video capture (rotating person) --stop video capture when

    €18 / hr (Avg Bid)
    €18 / hr Gns Bud
    43 bud
    guide me to use Pellet Reasoner 6 dage left
    VERIFICERET

    I would like to use Pellet reasoner (opensource) for RDF ontology. I face problems to compile and run the project. I need guidance for that. i would like to use Pellet reasoner to extract hidden/implicit relations in RDF ontology.

    €97 (Avg Bid)
    €97 Gns Bud
    5 bud
    Trophy icon Create logo + style 6 dage left

    ...the snake will have a more friendly face, instead of a mouth with is open and in the attack position. The Cobra is a sign of awareness and meditation, so please take that into consideration please. Example pictures Fenix and Cobra snake. [log ind for at se URL]

    €99 (Avg Bid)
    Garanteret
    €99
    15 indlæg

    ...integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those interested please write a proposal and quote me a rough price in order to have more discussion about the readiness

    €199 (Avg Bid)
    €199 Gns Bud
    83 bud

    I need a mood detection project written in MATLAB

    €22 (Avg Bid)
    €22 Gns Bud
    8 bud
    Trophy icon Logo Design :2 1 dag left

    Design a logo for me - The Theme Of Logo is: Heart Attack- Call > Ambulance>Hospital. Choice to have a 3D Logo. Heart Attack > Call > Ambulance & Hospital Feel. Thanks

    €11 (Avg Bid)
    Garanteret
    €11
    12 indlæg

    ...implement the radon transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code

    €29 / hr (Avg Bid)
    €29 / hr Gns Bud
    13 bud

    hi friend i have hire freelance from fivver to develop for me python ml script that will do the following requirements. 1-script or video software plugin(premier,AE,or any other) that will have function to make auto mask/filter on any nudity and woman with cleavage frames . 2-i dont want to bluer all the Detected frames, just the specific body parts

    €2 / hr (Avg Bid)
    €2 / hr Gns Bud
    1 bud

    ...and design calculations. the scope included lighting, Small Power Distribution, HVAC Telecom: Telephony & Ethernet, Security System: Intrusion detection @ windows + Movement Detection @ patio, F&G detection System. the apartment is around 95sqm and having mainly kitchen, living room+dining space, 2 bedrooms, toilette, bathroom, entrance + corridor and

    €303 (Avg Bid)
    €303 Gns Bud
    22 bud

    ...select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates (with the malware database), there may be ~50 type o "Trojan Horse" attacks that must be tested upon the source Other Info: - Th...

    €172 (Avg Bid)
    €172 Gns Bud
    4 bud

    ...originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017, Godinterest introduced

    €107 (Avg Bid)
    €107 Gns Bud
    27 bud

    Our initial intention was to implement a delay and stuck at fault detection system for a 32-bit AVR microcontroller. Starting from a configuration involving professional J-Link EDU equipment, we would check the White-box testing algorithm for the solar tracker by placing breakpoints and watch points inside the code to monitor changes in the registries

    €327 (Avg Bid)
    €327 Gns Bud
    8 bud
    Build me a website and Logo 5 dage left
    VERIFICERET

    ...installation services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on

    €511 (Avg Bid)
    €511 Gns Bud
    59 bud

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [log ind for at se URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time. So, the whole idea would be that you ...

    €9 - €26
    €9 - €26
    0 bud

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [log ind for at se URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time.   So, the whole idea would be t...

    €17 (Avg Bid)
    €17 Gns Bud
    2 bud

    ...basically give them a white page connection refused, so that need to be fixed as well and any other security issues. I do get daily drops and attacks someone been trying to hack attack daily for more than 2 years. If you do get the project you must take care of all the above issues and monitor the server for 10 days and solve any issues related, if these

    €39 (Avg Bid)
    €39 Gns Bud
    6 bud

    we aim to develop a machine learning method in email spam detection. The project is between 2018.12.08---2018.12.31 We hope the candidate have good programming capability and excellent at research writing.

    €1166 (Avg Bid)
    €1166 Gns Bud
    29 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    hello~ i'm Bo from Korea. If you see the photo 1.PNG. There are letters and numbers which is '5 2 d 8' and i have to click them!. But numbers in order first and then letters in order. For example) there are '5 2 d 8' in photo [log ind for at se URL] The correct answer is i have to click '2 5 8 d' in order. So the correct answer of...

    €439 (Avg Bid)
    €439 Gns Bud
    13 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...Hydraulic Calculations 4. HVAC Load Computations 5. Energy Analysis 6. Solar design (I have the calculation) 7. Duct Design 8. 4D information modeling using Navisworks + Clash detection ...

    €255 (Avg Bid)
    €255 Gns Bud
    24 bud

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    €237 (Avg Bid)
    €237 Gns Bud
    6 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    €111 (Avg Bid)
    €111 Gns Bud
    6 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud