detection model 中文意思是什麼

detection model 解釋
檢測模型
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  • model : n 1 模型,雛型;原型;設計圖;模範;(畫家、雕刻家的)模特兒;樣板。2 典型,模範。3 (女服裝店僱...
  1. In this paper, we introduce the intrusion detection system in the following aspects such as intrusion detection model, detection theory based on which we provide an intrusion detection system based on mobile agent

    本文通過對現有的入侵檢測系統的模型、檢測原理進行分析研究,提出了一個基於aglet移動代理平臺的入侵檢測系統。
  2. We do research on the transitions between states of network protocol, the protocol misusage detection model based on markov chain, the framework of the ids technology and protocol anormity after we discuss the current technology. the main research contents of this paper include : research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on

    在分析了現有入侵檢測系統的基礎上,本文圍繞典型網路協議狀態轉換、基於馬爾可夫鏈的檢測模型、入侵檢測技術框架、以及協議異常等幾個方面展開深入研究,主要工作內容包括:典型網路協議轉換狀態的分析和會話過程的研究;基於馬爾可夫鏈的網路異常檢測模型;分散式的檢測架構;針對網路流量特徵而提出了精確的檢測模型等。
  3. First of all, this paper introduce the markov chain theory. after analying the specifications of http, smtp, ftp, telnet and tcp, we know the tcp session is fit for the markov process. in this paper, we analyze the transitions between states of the application layer with the normal tcp traffic, and build a protocol misusage detection model with the normal traffic in darpa data set

    本文採用了馬爾可夫鏈理論,仔細分析了tcp協議規范,並研究分析了典型網路應用層協議http 、 smtp 、 ftp以及telnet ,驗證了基於tcp協議的會話過程就是一個馬爾可夫過程。
  4. An intrusion detection model based on neural network

    基於神經網路的入侵檢測模型
  5. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  6. A new anomaly detection model based on system call macro was presented

    提出了一個基於系統調用宏的異常檢測模型。
  7. A new anomaly detection model based on system call classification was presented

    提出了一個基於系統調用分類的異常檢測模型。
  8. A new two - layer markov chains anomaly detection model that operated on system call traces was presented

    提出了一個兩層馬爾可夫鏈異常入侵檢測模型。
  9. Based on intrusion detection common intrusion detection framework ( cidf ) architecture, a new network intrusion detection model of multi - data packages analysis was presented

    摘要在入侵檢測cidf體系結構基礎上,提出了基於網路的二層式多數據包分析入侵檢測模型。
  10. One is to study the axle temperature rule about a high speed running train, heat detection model and detection mode

    一是為適應列車不斷提速運輸發展的需要,研究高速運行列車的軸溫規律、熱判模型和探測方式。
  11. Another is to apply the expert control, intelligent control theory to the axle temperature rule and heat detection model. this will be the basis of the new era infrared axle detection system

    二是將專家控制、智能控制論應用於軸溫規律和熱判模型的研究,這將是新一代紅外線軸溫探測系統的基礎。
  12. Flowing and precipitation of the self - purification is applied in the intrusion detection for optimizing the detection model and eliminating the latent intrusion data. by making fitness function, model self - purifying is realized

    根據水體自凈的思想中的水體流動和沉澱的機理應用到入侵檢測演算法當中,實現了入侵檢測模型的優化,剔除了模型中潛在的入侵數據。
  13. An edge detection model with neuron - like organization

    一個具有擬神經組織的邊緣檢測模型
  14. We put focal point on the choice and design that the model of data mining, on the basis of the already studies of abroad and the actual needs of mobile telecommunication company. five data mining models of our mobile telecommunication operation are putted forward : customer value model, customer retention model, fraud detection model, customer segment model and best promotion method model. an online survey system was set up to collect research data, and sas enterprise miner was used to test and appraise these models

    本文沒有對的數據挖掘理論及建模方法等作過多的闡述,也沒有對數據倉庫建設方面做過細的探討,而是將重點放在數據挖掘模型的選擇與設計上,在國外的已有研究的基礎上,結合企業調研中企業的實際需要,提出了我國移動通信營業的客戶價值、客戶保持、客戶細分、欺詐識別和促銷方式選擇等五個數據挖掘模型;並建立了網上的問卷調查系統來收集研究數據,在sasenterpriseminer中對模型進行了驗證與評價。
  15. According to the standard of kddcup ' 99 and by adopting numeric mixed coding, 41 features of the captured network packets are extracted and transferred into numerical form which can be accepted by neural network in this paper, we present a misuse detection model based on hybrid neural network and decision tree

    根據第三屆國際知識發現和數據挖掘競賽( kddcup ' 99 )標準,對截獲的網路數據包進行41維特徵抽取,並採用混合數值編碼方法,使這些特徵轉化為能被神經網路處理的數值形式。
  16. An intrusion detection model for ad hoc network

    網路的一種入侵檢測模型
  17. The intrusion detection model based on association rules

    基於關聯規則自動建模的入侵檢測模型
  18. An intrusion detection model based on support vector machine

    一種基於支持向量機的入侵檢測模型
  19. Markov chain intrusion detection model based on system call macro

    基於系統調用宏的馬爾可夫鏈入侵檢測模型
  20. Study of a cooperative agent - based distributed intrusion detection model

    基於多智能體協同的分散式入侵檢測模型研究
分享友人