Hi I have a project based on parallel network area. It is an IDS that use to detect the suspicious network packets. In this program, we create a hybrid algorithm which read the network packets from the trace file (DEFCON11) and compare it with the Snort signature rule set database. (All data base are available and will provided by me). Regards
In this project you compete with other providers. The best outcome is chosen by the buyer and its provider is rewarded. For more information see the FAQ.
Use the "Project Type" filter on the left to filter all contest projects.In this project you place a bid to offer the price you wish to receive for performing it. The buyer chooses the provider by price and impression. For more information see the FAQ.
Use the "Project Type" filter on the left to filter all bidding projects.