檢測模型 的英文怎麼說

中文拼音 [jiǎnxíng]
檢測模型 英文
detection model
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  • 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
  1. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統利用多代理的思想來構造分散式入侵與響應系統,使之不但兼有基於自治代理和基於移動代理入侵的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵系統普遍存在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個自適應生成器來為代理自動生成檢測模型,從而使系統能更高效地運作。
  2. In this paper, a new model of network intrusion detection based on active counterwork response is proposed

    在本論文中,我們提出了基於主動對抗響應的網路入侵檢測模型
  3. We do research on the transitions between states of network protocol, the protocol misusage detection model based on markov chain, the framework of the ids technology and protocol anormity after we discuss the current technology. the main research contents of this paper include : research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on

    在分析了現有入侵系統的基礎上,本文圍繞典網路協議狀態轉換、基於馬爾可夫鏈的檢測模型、入侵技術框架、以及協議異常等幾個方面展開深入研究,主要工作內容包括:典網路協議轉換狀態的分析和會話過程的研究;基於馬爾可夫鏈的網路異常檢測模型;分散式的架構;針對網路流量特徵而提出了精確的檢測模型等。
  4. An intrusion detection model based on neural network

    基於神經網路的入侵檢測模型
  5. The test model of random phasic signal and its application in the mobile privacy radio system

    隨機相位信號檢測模型及其在移動通信保密系統中的應用
  6. A new anomaly detection model based on system call macro was presented

    提出了一個基於系統調用宏的異常檢測模型
  7. A new anomaly detection model based on system call classification was presented

    提出了一個基於系統調用分類的異常檢測模型
  8. A new two - layer markov chains anomaly detection model that operated on system call traces was presented

    提出了一個兩層馬爾可夫鏈異常入侵檢測模型
  9. Based on intrusion detection common intrusion detection framework ( cidf ) architecture, a new network intrusion detection model of multi - data packages analysis was presented

    摘要在入侵cidf體系結構基礎上,提出了基於網路的二層式多數據包分析入侵檢測模型
  10. On the designing part of the raas, the generation of events, the normal library of users, the process of detecting and analyzing, and the response units were described based on the cidf

    在此基礎上,在實時審計分析系統的設計部分,依照通用的入侵檢測模型( cidf )對監控事件的產生、用戶正常規則庫、監控分析過程和響應單元逐個進行闡述。
  11. According the cidf pattern, the system was divided into five fundamental modules : packet capture, network sniffer, rules disposal, data analyze and system reaction. each module mapp ed to different applications and the system function was introduced in brief

    根據cidf入侵檢測模型,將系統分為五個基本塊:數據捕獲、網路監聽、規則處理、數據分析和系統響應塊,分別對應于不同的應用功能;並對目前開發的系統功能做了簡單的介紹。
  12. 3. after studying deeply the multi - antenna sar mtdi based on displaced phase center antenna ( dpca ), a new double - antenna method is proposed which remedies the shortcomings of conventional ways. the method need n ' t meet the constraint condition that conventional ways must meet and can suppress ground clutter effectively and detect moving target

    針對常規dpca方法的缺點創新性的提出了一種新的雙天線動目標方法,建立了該方法的檢測模型並對該方法進行了有效的驗證,該方法不合成孔什雷達動口標和成像研必滿足常規方法所必須滿足的限制條件就能夠進行動目標,提高了dpca的實用價值。
  13. Presently, the false alarm rate of most idss is high and their efficiency is low. aimed at these drawbacks of present idss, researches on ids models and neural network - based intrusion detection are presented in this paper

    目前大多數入侵系統誤警率較高,效率較低,為克服現有ids的不足,本文從入侵檢測模型、神經網路應用於入侵等方面進行了研究。
  14. Supported by the national high technology research and development program ( 863 program ), the research topic of this thesis is dedicated to negative selection model and its application to intrusion detection

    本課題圍繞計算機免疫學的負選擇檢測模型以及基於該的入侵應用展開了深入的研究。
  15. Flowing and precipitation of the self - purification is applied in the intrusion detection for optimizing the detection model and eliminating the latent intrusion data. by making fitness function, model self - purifying is realized

    根據水體自凈的思想中的水體流動和沉澱的機理應用到入侵演算法當中,實現了入侵檢測模型的優化,剔除了中潛在的入侵數據。
  16. An edge detection model with neuron - like organization

    一個具有擬神經組織的邊緣檢測模型
  17. In this paper, the author applied bp algorithm in this subsystem, and a model of crack detection of glass bottle is described. this model enables the detection system to enhance the capabilities of auto - learning and auto - adapting greatly by overcoming the weakness of the worse adaptability of adapting the change of the environment and the worse tolerance to mistakes of the new information

    本論文將bp演算法應用於該子系統中,建立了基於bp神經網路的「玻璃瓶口裂紋檢測模型」 ,克服了原演算法對環境變化適應的靈活性和對新信息的容錯性較差的弱點,從而使該系統的自學習、自適應能力大大增強了。
  18. Fault detection algorithm for grid based on dynamic grey prediction in order to satisfy the requirement of the fault detection of grids, a dynamic - grey - prediction - based fault detection algorithm was presented. according to the unreliable failure detection theory, models for grid systems and fault detection were establishe.

    基於不可靠故障思想,建立了網格系統及故障檢測模型結合心跳策略和灰色預方法,設計了一種動態心跳機制,並給出了預和實時預策略提出了基於該動態心跳機制的網格故障演算法
  19. Further, some knowledge of information theory are introduced to describe the regularity of process system calls such as the sequential dependency relationship between neighboring system calls. the use of information theory provides theoretic proof for creating more effective detecting models. in the end, applying for the maximum entropy method in information theory, a maximum entropy model of intrusion detection is presented

    同時,為了提高入侵的準確性,又在原有的馬爾可夫鏈的基礎上,引進信息理論中的信息熵,條件熵等概念來更好地刻畫進程系統調用序列的時序依賴關系,從而為建立更好的檢測模型提供信息理論依據。
  20. An intrusion detection model for ad hoc network

    網路的一種入侵檢測模型
分享友人