系統調用 的英文怎麼說

中文拼音 [tǒngdiàoyòng]
系統調用 英文
bdosptrdos
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 調 : Ⅰ動詞1 (配合得均勻合適) harmonize; suit well; fit in perfectly 2 (使配合得均勻合適) mix; adju...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  • 調用 : transfer (officer) temporarily for a specific task; [計算機] call; invoking調用程序 caller; cal...
  1. A new anomaly detection model based on system call macro was presented

    提出了一個基於系統調用宏的異常檢測模型。
  2. A new anomaly detection model based on system call classification was presented

    提出了一個基於系統調用分類的異常檢測模型。
  3. System call modules are simply klds that install a system call

    系統調用模塊是安裝系統調用的kld 。
  4. Rsp can also be called as the adapt layer of operating system. it is logically between the commercial operating system in the lower layer and the applied programme in the upper layer, while functionally actualizes a capsulation of the system calls and api interfaces provided by the commercial real - time operating system

    Rsp也可以稱為操作的適配層,邏輯上,它的位置介於底層商操作和上層應之間;功能上, rsp實現了對商的實時操作提供的系統調用及api介面的封裝。
  5. An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf )

    參考通入侵檢測公共框架( cidf ) ,設計並實現了基於系統調用監控的linux主機入侵檢測,在其中採了hmm檢測演算法。
  6. Called by the system to retrieve the current bounds of the activex control

    已重寫。由系統調用來檢索activex控制項的當前界限。
  7. This method is called by the system to deserialize a

    此方法由系統調用以反序列化
  8. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,檢測到的實時調序列建立模糊子集b ,然後模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤入侵檢測,彌補了單一檢測方法的不足。
  9. On linux, if a new handle is to be allocated, the system call dup is used, while in cases where a known handle is used as a new handle, the system call

    在linux中,如果要分配一個新句柄,可以使系統調用dup ( ) ;如果要將一個已知句柄當作一個新句柄使,可以使系統調用dup2 ( ) 。
  10. A kernel - based emulator traps the system calls when they reach it

    基於內核的模擬器可以捕捉到到達它的系統調用
  11. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體結構中還引入了數據挖掘思想,利數據挖掘技術中的關聯分析、分類等演算法從日誌、系統調用序列、網路流等海量的安全審計數據中提取關鍵的特徵屬性,根據這些屬性生成安全審計數據的分類模型於入侵檢測。
  12. It is called by the asp. net health - monitoring system

    它由asp . net運行狀況監視系統調用
  13. After carefully comparing various intrusion detection techniques, the research on hmm applied in hids is proposed, which is based on monitoring linux system calls

    通過對各種入侵檢測技術的分析和比較,確定了在linux中基於系統調用監控的主機入侵檢測的方案。
  14. System calls. when an emulator ordinarily encounters a powerpc system call instruction, it emulates the exception by storing the instruction address into the srr0 register, setting some architecture - defined bits in srr1, and transferring control to physical address 0xc00. some powerpc variants allow more control over this behavior, but this is the traditional powerpc model

    當模擬器正常地碰到一個powerpc系統調用指令時,它便將指令地址存入到srr0寄存器,設置srr1中某些體結構定義的位,並將控制權轉交給物理地址0xc00 ,從而模擬這個異常(有些powerpc的變種允許對這種行為有更多的控制,但是這里的這種是傳的powerpc模型) 。
  15. The data transmission rate is effectively increased by using data packet as i / o read and write system call functions " parameter

    本文通過將數據包作為i o讀寫系統調用函數的參數有效地提高了數據傳輸率。
  16. A new method to detect intrusions using system calls

    系統調用序列檢測入侵的一種新方法
  17. When an emulator supporting user - mode emulation encounters a system call instruction, on the other hand, it does not transfer control to the emulated exception handler ; instead it interprets the system call itself

    另一方面,當一個支持戶模式模擬的模擬器碰到一個系統調用指令時,它並不是把控制轉交給模擬的異常處理程序,相反,它會自己解釋該系統調用
  18. System calls - for i o related problems

    系統調用數-於與i / o相關的問題
  19. No other samples, such as cpu, page faults, or system calls are collected

    而不收集其他樣本,如cpu 、頁錯誤或系統調用數。
  20. The implementation of deltafile 3. 0 can be divided into two modules ? real - time file system module and manage module for both facilities and drives. the real - time file system contains four parts ? system call api layer, file node manage layer, virtual file system layer, concrete file system layer, which perform the abstraction of the facility

    實時文件模塊包含系統調用api層、文件節點管理層、虛擬文件層、具體邏輯文件層四部分,主要完成與設備無關的數據存取介面抽象和各種文件標準的實現;設備與驅動管理模塊包含邏輯設備管理層、物理設備管理層、設備緩沖區高速緩存層、設備驅動管理層四部分,主要完成外部存儲設備管理及其驅動介面抽象功能。
分享友人