補列報表 的英文怎麼說

中文拼音 [lièbàobiǎo]
補列報表 英文
giving-effect statement
  • : Ⅰ動詞1 (修理; 修補) repair; mend; patch 2 (補充; 補足;填補) fill up; add supplement; supply; ...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ動詞1 (告知; 報告) report; declare; announce 2 (回答) reply; respond; reciprocate 3 (答謝)...
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • 報表 : report forms; forms for reporting statistics, statements and reports; journaling; journal sheet
  1. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏率和誤率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌了單一檢測方法的不足。
  2. In addition, the presenter will report on at least one of the supplemental readings listed on the syllabus

    另外,陳述者要至少就教學大綱出的一本充讀物發告。
  3. A complementary set of functions allow the application to obtain a list of available alarms & events servers

    還有一個充函數集允許應用獲取可用的警/事件服務器
分享友人