Showing 10 open source projects for "intrusion detection system code in java"

View related business solutions
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 1
    Discovery

    Discovery

    Nepxion Discovery is a solution for Spring Cloud

    Nepxion Discovery is a solution for Spring Cloud with blue green, gray, route, blacklist, limitation, circuit breaker, degrade, isolation, monitor, tracing, dye, failover, async agent. Only one or more services are upgraded at a time, the upgrade is completed and monitored and observed, and this process is performed continuously until all the old versions in the cluster are upgraded to the new version. In the process of stopping the old version, it is impossible to accurately calculate...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    X's Recommendation Algorithm

    X's Recommendation Algorithm

    Source code for the X Recommendation Algorithm

    The Algorithm is Twitter’s open source release of the core ranking system that powers the platform’s home timeline. It provides transparency into how tweets are selected, prioritized, and surfaced to users, reflecting Twitter’s move toward openness in recommendation algorithms. The repository contains the recommendation pipeline, which incorporates signals such as engagement, relevance, and content features, and demonstrates how they combine to form ranked outputs. Written primarily in...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    JPPF

    JPPF

    The open source grid computing solution

    JPPF makes it easy to parallelize computationally intensive tasks and execute them on a Grid.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    OovAide

    C++, Java IDE with auto class, sequence, zone, dependency, diagrams

    The OovAide project used to be named oovcde. Searching the web will bring up more information about oovcde at this time. The OovAide project is a C++ or Java analysis IDE for Windows or Linux with an automated multi-tasking build system, cross compiler support, an analysis tool based on CLang that creates UML class, component, sequence as well as zone and portion diagrams from C++ or Java source, static analysis and test coverage. The diagrams allow navigation through the source code,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 5
    XML-CF-lib

    XML-CF-lib

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    telescope-cf-library

    telescope-cf-library

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This project enables Java applications to access detailed information about the host on which the JVM is running. This code was originally developed to run on a billion $ company's Grid System for host detection, and is now being released publicly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build innovative business apps powered by process automation Icon
    Build innovative business apps powered by process automation

    Connect workflows, teams and systems within one digital business transformation platform

    Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
    Learn More
  • 10
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB