調用序列 的英文怎麼說

中文拼音 [diàoyòngliè]
調用序列 英文
calling sequence
  • 調 : Ⅰ動詞1 (配合得均勻合適) harmonize; suit well; fit in perfectly 2 (使配合得均勻合適) mix; adju...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • 調用 : transfer (officer) temporarily for a specific task; [計算機] call; invoking調用程序 caller; cal...
  1. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調基礎上建立正常行為模糊子集a ,檢測到的實時調用序列建立模糊子集b ,然後模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調及參數的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤入侵檢測,彌補了單一檢測方法的不足。
  2. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利數據挖掘技術中的關聯分析、分類等演算法從系統日誌、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型於入侵檢測。
  3. Event handler for the package to execute

    事件處理程執行的調用序列
  4. A new method to detect intrusions using system calls

    系統調用序列檢測入侵的一種新方法
  5. Which provides methods to invoke serialization and deserialization

    ,提供調用序列化和反化的方法。
  6. Provides an interface that can invoke serialization and deserialization

    提供一個可調用序列化和反化的介面。
  7. For the data type, and then invokes the serializer to deserialize the data type

    ,然後調用序列化程化該數據類型。
  8. For the root component of the designer and invokes the serializer to serialize the component

    ,並調用序列化程化該組件。
  9. Block, and then moves up the series of prior method calls until the exception can be handled

    塊,然後向上移動之前的方法調用序列,直到可處理異常。
  10. This section visually presents the sequence of function calls in the visual basic application model

    本節以圖形的方式呈現visual basic應模型中的函數調用序列
  11. The following code example shows how the calling serializer resolves what happens with this error occurs

    下面的代碼示例演示調用序列化程如何解決發生此錯誤時的情況。
  12. The first example shows the api call sequence involved when a user opens a data source and chooses to view an annotation

    第一個例子展示了在戶打開數據源並選擇查看注釋時所涉及的api調用序列
  13. Further, some knowledge of information theory are introduced to describe the regularity of process system calls such as the sequential dependency relationship between neighboring system calls. the use of information theory provides theoretic proof for creating more effective detecting models. in the end, applying for the maximum entropy method in information theory, a maximum entropy model of intrusion detection is presented

    同時,為了提高入侵檢測的準確性,又在原有的馬爾可夫鏈模型的基礎上,引進信息理論中的信息熵,條件熵等概念來更好地刻畫進程系統調用序列的時依賴關系,從而為建立更好的檢測模型提供信息理論依據。
  14. As the expriment result shows, we can use the range of misclassification rate ( which the maximum entropy model supports ) as the indicator of whether a process is attacked

    最後,我們運最大熵原理建立進程調用序列的最大熵(分類)模型,運模型預測系統調和利誤分類率為檢測指標,以達到更好地檢測入侵目的。
  15. Primary experiments confirm that both methods are feasible, and the latter one would be better due to taking account of the sequential relation of system calls in process

    兩種方法中,由於馬爾科夫鏈方法考慮了系統調用序列的順關系,因此效果更好。
  16. As each serializer creates an expression and invokes a serializer to handle a smaller part of the statement as a whole, the serializer pushes an expression context on the context stack

    由於每個化程都會創建表達式並調用序列化程將語句的較小部分作為整體處理,所以化程會將表達式上下文推送到上下文堆棧上。
  17. First, the normal state pattern length was fixed, which eliminated the negative influence brought by the uncertainty length of the partial system call sequence

    第一,正常狀態模式的長度固定,消除了局部系統調用序列長度不固定帶來的負面影響。
  18. The following graphic shows the application model call sequence in a normal visual basic windows forms application. the sequence starts when the

    以下圖形顯示了在普通的visual basic windows窗體應中的應模型調用序列
  19. This information includes where the procedure is located, how it is identified, its calling sequence and return type, and the string character set it uses

    這些信息包括過程所在位置、標識方式、調用序列和返回類型以及它所使的字元串字符集。
  20. In addition to the normal functional interface of a component, by adding a test interface that exposes the logical states of the component, a tester can dynamically monitor and capture states information and service calling sequence of the component during testing

    更進一步,在進行組件集成測試時,本文提出了組件內置測試機制和一種提高組件可測試性的方法,通過對各交互組件進行封裝並擴展測試介面,達到在測試時動態監視和捕捉組件狀態和服務調用序列信息的作
分享友人