> I have talked with Luís Bastião Silva the past days on IRC about the
> ideas proposed for Umit during GSoC2011 and I finally got the time to
> work on the architecture of my proposal. The architecture is formed
> around "4 - Network Inventory - next generation". It's obviously not
> the final ver
Greetings!
My name is Dragos, a year 3 student at the Polytechnic University of
Bucharest, Computer Science Faculty. I was a student last year at GSoC
for GNOME and worked on a snippets plugin for the Anjuta IDE (my work
can be viewed at [1]). It was a very fun experience and I hope I will
get the
On Tue, Mar 29, 2011 at 3:10 PM, Kay wrote:
> Thanks for your suggestion. Yep, I know there are many types of DDoS attack,
I was talking about many types of detection. But you are right, there
are many types of attack either.
> Since you have experience in this area, what's your opinion? If you
Hi bart.
Thanks for your suggestion. Yep, I know there are many types of DDoS attack,
but some of them are not common and will not occur for a personal IDS. I
think the port-scan and the sync-attack are most common forms of attack for
a personal server or something.
Since you have experience in th
Hi, João
Thanks for your suggestion, I finished almost all the fields in proposal
except the project details section.
I have never learned neutral network before, and it's hard for me to
understand your slides. Do you have a full paper introducing the algorithm
or some sample program so I can stud