Write code intrusion detection prevention using windows jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    13,222 write code intrusion detection prevention using windows jobs found, pricing in NZD

    Hello me in Image processing edge detection

    $218 (Avg Bid)
    $218 Avg Bid
    18 bids

    ...nonprofits and programs and resources offered in their area today and provide a reference tool • NAMI (National Association for Mental Illness) • AFSP (Association for Suicide Prevention) Creating a "Culture" that amplifies the health of it's employees Ideas for activities and content and sustainment tools Future Ideas to Sustain our program and marketing

    $1499 (Avg Bid)
    $1499 Avg Bid
    21 bids

    Scope of work: Applying PWA on existing simple website with the ...you can resize and edit). 3- Location and position (integrated with google maps). 4- Push notification (allow to send notification to users). 5- Offline mode. 6- Foreground detection. 7- Home screen installation. Ensuring that it will work on (IOS, Android) and browser (Safari, Chrome)

    $318 (Avg Bid)
    $318 Avg Bid
    17 bids

    Expanded evidence-based treatments.  .promotion of research on related health services and suicide prevention.

    $466 (Avg Bid)
    $466 Avg Bid
    17 bids

    Residential and commercial plumbing company specialising in hot and cold water, sewerage and storm water,...cold water, sewerage and storm water, excavation, gas installation and repair, roofing repairs and replacement, drainage, cctv camera, downpipes, emergency plumbing, leak detection, water filtration, solar installation, gas leaks, wall cladding.

    $477 (Avg Bid)
    $477 Avg Bid
    48 bids

    ...specific angle to continue -- continuous check for gyroscope while running camera feed to ensure the specific angle stays the same for the camera feed capture process -- frame detection for when someone is completely still for 3 seconds (e.g. frame has minimal pixel changes for 3 seconds) --primary video capture (rotating person) --stop video capture when

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    47 bids

    ...doing well. I have developed a Python tool to find OWASP's top 10 mainly (Cross-site scripting and SQL Injection) vulnerabilities from PHP Web applications using pattern matching and OWASP's prevention rules for XSS and SQLI. So I have developed the tool, the tool can scan files from the vulnerabilities as mentioned earlier and prints vulnerabilities whether

    $276 (Avg Bid)
    $276 Avg Bid
    9 bids

    I need a mood detection project written in MATLAB

    $36 (Avg Bid)
    $36 Avg Bid
    9 bids

    ...transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code and instructions on

    $48 / hr (Avg Bid)
    $48 / hr Avg Bid
    13 bids

    hi friend i have hire freelance from fivver to develop for me python ml script that will ...for sample . he said that i have to use powerful cloud hosting with strong gpu. i want to concluse with you is it possible to achieve true live video cleavage body parts detection and automatically blurring this frames? maybe with google cloud vision.. thanks

    $3 / hr (Avg Bid)
    $3 / hr Avg Bid
    1 bids

    ...drawings and design calculations. the scope included lighting, Small Power Distribution, HVAC Telecom: Telephony & Ethernet, Security System: Intrusion detection @ windows + Movement Detection @ patio, F&G detection System. the apartment is around 95sqm and having mainly kitchen, living room+dining space, 2 bedrooms, toilette, bathroom, entrance + corr...

    $489 (Avg Bid)
    $489 Avg Bid
    23 bids

    ...delay and stuck at fault detection system for a 32-bit AVR microcontroller. Starting from a configuration involving professional J-Link EDU equipment, we would check the White-box testing algorithm for the solar tracker by placing breakpoints and watch points inside the code to monitor changes in the registries. This was done using the Arduino Due platform

    $541 (Avg Bid)
    $541 Avg Bid
    8 bids
    Build me a website and Logo 4 days left
    VERIFIED

    ...installation services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on

    $834 (Avg Bid)
    $834 Avg Bid
    60 bids

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [login to view URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time. So, the whole idea would be that you coul...

    $15 - $44
    $15 - $44
    0 bids

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [login to view URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time.   So, the whole idea would be that ...

    $28 (Avg Bid)
    $28 Avg Bid
    2 bids
    All About Pets 4 days left

    ...long-term working relationship with talented who love to care and write about pets. Apart from helping pet lovers choose the right pets for their homes and family, you will also be providing top of the line pet care tips (declawing canines, grooming, feeding, vaccination, obesity prevention, exercise) and reviewing different types of pet products and accessories

    $8848 (Avg Bid)
    $8848 Avg Bid
    31 bids

    we aim to develop a machine learning method in email spam detection. The project is between 2018.12.08---2018.12.31 We hope the candidate have good programming capability and excellent at research writing.

    $1914 (Avg Bid)
    $1914 Avg Bid
    30 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $364 (Avg Bid)
    $364 Avg Bid
    1 bids

    hello~ i'm Bo from Korea. If you see the photo 1.PNG. There are letters and numbers which is '5 2 d 8' and i have to click them!. But numbers in order first and then letters in order. For example) there are '5 2 d 8' in photo [login to view URL] The correct answer is i have to click '2 5 8 d' in order. So the correct answer of pho...

    $726 (Avg Bid)
    $726 Avg Bid
    13 bids

    ...mapping (1,000,000 Kwh). So, the total will be 45,000,000 Kwh annually without the pools and jacuzzies. I need also some calculations of the following to be considered in using geothermal energy (check the form in the attachments): Energy load: Heating: Total Peak Load: Annual Equivalent Full Load Hours: Annual Heating Load: Domestic Hot Water

    $421 (Avg Bid)
    $421 Avg Bid
    24 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $364 (Avg Bid)
    $364 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $363 (Avg Bid)
    $363 Avg Bid
    1 bids

    ...pre-OS (firmware) of devices against a whitelist of approved firmware and, by using ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This

    $806 (Avg Bid)
    $806 Avg Bid
    1 bids

    hello i am looking for a teacher to teach me how to make a crypter and make it fud and keep it must have this 86/x64 Os Support Obfuscate - Make code hard to understand Native File & .NET File Support - Support all executables Multiple Install Options - Choose your startup and install options Multiple Injections - Svchost/Self/Regasm File Info - Gives

    $785 (Avg Bid)
    $785 Avg Bid
    4 bids

    ...transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code and instructions on

    $221 (Avg Bid)
    $221 Avg Bid
    10 bids

    ...experienced in computer vision machine learning, Artificial intelligence and deep learning and its applications in facial & face detection to design and develop a commercial software. The commercial software will be using Artificial intelligence and deep learning in detecting faces, including at what time, the gender, the age bracket and etc The goal

    $880 (Avg Bid)
    $880 Avg Bid
    12 bids

    Hi I am looking for a Object detection, recognition and segmentation of vehicles in ANPR problem using deep learning models. In that we can use [login to view URL] dataset for our work. So will it be possible for you

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    8 bids

    ...this assignment you can use any Dataset from Kaggle. In many real-life Data Analytic/Mining cases we focus on to identify outliers. For example; network intrusion detection or bank fraud detection. Find a similar field that we look for outliers. Work on a dataset that main focus is to identify outliers. Original fields will be rewarded with extra

    $145 (Avg Bid)
    $145 Avg Bid
    1 bids

    I want you to write a small report on malware detection All the necessary documents and links for reference will be provided

    $32 (Avg Bid)
    $32 Avg Bid
    12 bids

    Technical Specifications  Electrical input: 2 flow (pulse) - 10Hz, 6 ana...hour in defined increments o Data storage: Rotating store.  Alarm Dial-Out: o Programmable high and low flow rate, Pressure and daily consumption alarms. o Alarm on tamper detection. o Low battery alarm.  Environmental: o Operating ambient temperature: -30°C to +60°C

    $3 - $12 / hr
    Sealed
    $3 - $12 / hr
    3 bids

    I need some help for this work, A cyclic code of length 7 bits with the generator polynomial of 1. Explain the systematic and non-systematic methods 2. Evaluate the error-correction and error-detection capability 3. Explain how the capability of the code can help improve the performance of the system.

    $74 (Avg Bid)
    $74 Avg Bid
    2 bids