需要有威胁检测规则并执行安全策略。
Threat detection rules and security policy enforcement are needed.
内存泄漏检测规则是按照一种简单的理念设计的。
The memory leak detection rule was designed in accordance with a simple philosophy.
入侵检测系统的关键在于检测规则的准确性和概括性。
The accuracy and generalization of detection rules are two key factors for IDS.
规则检测技术的效率直接取决于用于检测规则的规则集质量。
The efficiency of set inspection technologies is directly linked to the quality of the set that used for rule inspection.
它为解决方案构建者和用户提供了一个平台,用于编写有关数据模式的检测规则。
It provides a platform for solution builders and users to write detection rules on patterns of data.
提出了一种新的基于扩张矩阵和遗传算法理论产生最优检测规则的方法。
We propose a new approach to generating optimum intrusion detection rules based on extension matrix and Genetic Algorithm(GA)theory.
所有的临床工作都需要信息:询问患病史、检测规则、读书、请教同事。
The need for information underlies essentially all clinical work: the questions asked during a patient history, the tests ordered, the books read, and the questions asked of colleagues.
提出了基于数据挖掘的网络入侵检测规则特征值自动发现算法和规则自动生成算法。
This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.
同时提出了一个反馈误差学习算法,用于对模糊检测规则进行改进以求达到识别的最优。
And a feedback study algorithm is proposed, with which it modifies the fuzzy detection rules to get the optimal results of recognition.
最后给出了自适应检测层的成熟检测规则生成算法、自适应识别算法和检测规则的进化原理。
At the end, the algorithm of generating the mature detection rule, self-adaptive identify and the evolution principle of the detection rule in adaptive detection are presented.
实验结果表明,本文提出的算法可以有效地检测规则图像的边缘,抑制复杂纹理区域的边缘。
The results show that this algorithm effectively detects edges of regular images and depress the edges of the others.
对收集到的入侵数据进行预处理、数据离散化,属性约简,并依据生成的检测规则来分析入侵数据。
The algorithm includes data preconditioning, data discretization, attribute reduction, production of detection rules, and finally analysis of intrusion data with these rules.
为了解决这些问题,提出了一个基于人工免疫原理的入侵检测模型,该模型使用负筛选算法产生检测规则集。
In order to solve these problems, an intrusion detection system model based on AIS is put forward. Detection rules are produced by negative selection algorithm.
它使用负筛选算法来生成检测规则,并不断地进行检测规则优化以剔除冗余的检测规则,保留高效的检测规则。
The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory detectors.
本篇论文针对当前网络入侵检测系统(IDS)的检测规则,提出了一个具有弹性的、实时的,能动态调整入侵规则的方案。
This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.
在这个参考架构中,该角色由WebSphereBusinessEvents担任,它提供一个平台,允许解决方案构建者和使用者编写数据模式的检测规则。
In this reference architecture, that role is filled by WebSphere Business Events, which provides a platform that enables solution builders and users to write detection rules on patterns of data.
该系统基于公共入侵检测框架(CIDF)构建,当出现新攻击时,利用数据挖掘对海量数据进行挖掘,得出入侵模型后由系统自动转换为检测规则以实现规则库的自动更新。
This framework is based on CIDF, and uses Data Mining to mine intrusion models, then automatically transforms it into intrusion detection rules for rule base's updating.
还要注意,如何通过一条新规则,随意检测数字。
Note also how Numbers are optionally detected through a new rule.
上述三个规则,用于检测过度占用CPU资源的任务。
The three rules above are used to detect jobs using too much CPU.
这些规则通常将对某个时间段内的消息按照类型和条件进行筛选,然后根据各种预定义模式检测各种状况。
These rules typically filter messages by type and condition within some time window and then detect situations according to various predefined patterns.
此外,DB 2要求遵从基本的语法规则,以检测潜在的对空间谓词的使用。
Additionally, DB2 requires that you follow a basic syntax rule in order to detect the potential application of a spatial predicate.
不过,我们可以这样说,虽然此规则比较简单,但是我们的实现开销很小,可以使用普遍可用的统计信息来检测内存泄漏。
However, we can say that, though simple, our implementation is cheap, USES universally available statistics, and detects memory leaks.
注意,第一个规则检测一些国家并创建一个“com . ibm . es . uima . Country”类型的注释。
Note that some countries are detected in the first rule and an annotation of type "com.ibm.es.uima.Country" is created.
BusinessEvents负责检测何时出现了业务规则。
Business Events is responsible for detecting when a business rule has occurred.
然后我们运行分析工具来检测任一catch块实例是否在旧的分析下可以编译而在新的规则下却不能编译。
We then ran our analysis tool to detect whether any instances of catch blocks would compile under the old analysis rules but fail to compile under the new rules.
一系列的GRC检测与规则被实施。
编写通用规则的第一步,是正确地识别您想要检测到的问题。
The first step in writing a custom rule is to correctly identify the problem that you want to detect.
也可以编写检查代码是否符合小组规则的检测器。
Or maybe you could write detectors that check that your code follows your team's guidelines.
对于测试发现,也是如此:py . test按照固定、不可变且可预测的规则检测测试模块中的测试,而nose采用灵活的可定制的规则。
It is the same in this case: the rules by which tests are detected inside of a test module are fixed, invariant, and predictable for py.test, while they are flexible and customizable for nose.
对于测试发现,也是如此:py . test按照固定、不可变且可预测的规则检测测试模块中的测试,而nose采用灵活的可定制的规则。
It is the same in this case: the rules by which tests are detected inside of a test module are fixed, invariant, and predictable for py.test, while they are flexible and customizable for nose.
应用推荐