• 需要威胁检测规则执行安全策略

    Threat detection rules and security policy enforcement are needed.

    youdao

  • 内存泄漏检测规则按照一种简单理念设计的。

    The memory leak detection rule was designed in accordance with a simple philosophy.

    youdao

  • 入侵检测系统关键在于检测规则准确性概括性

    The accuracy and generalization of detection rules are two key factors for IDS.

    youdao

  • 规则检测技术效率直接取决于用于检测规则规则质量

    The efficiency of set inspection technologies is directly linked to the quality of the set that used for rule inspection.

    youdao

  • 解决方案构建者用户提供了一个平台,用于编写有关数据模式检测规则

    It provides a platform for solution builders and users to write detection rules on patterns of data.

    youdao

  • 提出一种新的基于扩张矩阵遗传算法理论产生检测规则方法

    We propose a new approach to generating optimum intrusion detection rules based on extension matrix and Genetic Algorithm(GA)theory.

    youdao

  • 所有临床工作需要信息询问患病检测规则读书请教同事

    The need for information underlies essentially all clinical work: the questions asked during a patient history, the tests ordered, the books read, and the questions asked of colleagues.

    youdao

  • 提出基于数据挖掘网络入侵检测规则特征自动发现算法规则自动生成算法。

    This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.

    youdao

  • 同时提出了一个反馈误差学习算法,用于对模糊检测规则进行改进以求达到识别优。

    And a feedback study algorithm is proposed, with which it modifies the fuzzy detection rules to get the optimal results of recognition.

    youdao

  • 最后给出适应检测成熟检测规则生成算法、自适应识别算法检测规则进化原理

    At the end, the algorithm of generating the mature detection rule, self-adaptive identify and the evolution principle of the detection rule in adaptive detection are presented.

    youdao

  • 实验结果表明本文提出算法可以有效地检测规则图像边缘抑制复杂纹理区域的边缘。

    The results show that this algorithm effectively detects edges of regular images and depress the edges of the others.

    youdao

  • 收集到入侵数据进行预处理、数据离散化,属性约简依据生成检测规则分析入侵数据。

    The algorithm includes data preconditioning, data discretization, attribute reduction, production of detection rules, and finally analysis of intrusion data with these rules.

    youdao

  • 为了解决这些问题提出了基于人工免疫原理的入侵检测模型,该模型使用筛选算法产生检测规则集。

    In order to solve these problems, an intrusion detection system model based on AIS is put forward. Detection rules are produced by negative selection algorithm.

    youdao

  • 使用筛选算法生成检测规则,并不断地进行检测规则优化以剔除冗余的检测规则保留高效的检测规则

    The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory detectors.

    youdao

  • 本篇论文针对当前网络入侵检测系统(IDS)检测规则提出了一个具有弹性的、实时的,能动态调整入侵规则方案

    This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.

    youdao

  • 这个参考架构中,角色WebSphereBusinessEvents担任提供一个平台允许解决方案构建者使用者编写数据模式检测规则

    In this reference architecture, that role is filled by WebSphere Business Events, which provides a platform that enables solution builders and users to write detection rules on patterns of data.

    youdao

  • 系统基于公共入侵检测框架CIDF)构建,当出现新攻击时,利用数据挖掘对海量数据进行挖掘,得出入侵模型后由系统自动转换检测规则以实现规则的自动更新

    This framework is based on CIDF, and uses Data Mining to mine intrusion models, then automatically transforms it into intrusion detection rules for rule base's updating.

    youdao

  • 还要注意如何通过一条规则随意检测数字

    Note also how Numbers are optionally detected through a new rule.

    youdao

  • 上述三个规则用于检测过度占用CPU资源任务

    The three rules above are used to detect jobs using too much CPU.

    youdao

  • 这些规则通常将对某个时间段消息按照类型条件进行筛选然后根据各种预定义模式检测各种状况

    These rules typically filter messages by type and condition within some time window and then detect situations according to various predefined patterns.

    youdao

  • 此外DB 2要求遵从基本语法规则检测潜在的对空间谓词使用

    Additionally, DB2 requires that you follow a basic syntax rule in order to detect the potential application of a spatial predicate.

    youdao

  • 不过我们可以这样虽然规则比较简单,但是我们实现开销很小,可以使用普遍可用统计信息检测内存泄漏

    However, we can say that, though simple, our implementation is cheap, USES universally available statistics, and detects memory leaks.

    youdao

  • 注意第一规则检测一些国家创建一个“com . ibm . es . uima . Country”类型注释

    Note that some countries are detected in the first rule and an annotation of type "com.ibm.es.uima.Country" is created.

    youdao

  • BusinessEvents负责检测何时出现业务规则

    Business Events is responsible for detecting when a business rule has occurred.

    youdao

  • 然后我们运行分析工具检测任一catch实例是否分析可以编译新的规则下却不能编译。

    We then ran our analysis tool to detect whether any instances of catch blocks would compile under the old analysis rules but fail to compile under the new rules.

    youdao

  • 一系列GRC检测规则实施。

    A series of GRC checks and rules are executed.

    youdao

  • 编写通用规则一步正确地识别检测问题

    The first step in writing a custom rule is to correctly identify the problem that you want to detect.

    youdao

  • 可以编写检查代码是否符合小组规则检测

    Or maybe you could write detectors that check that your code follows your team's guidelines.

    youdao

  • 对于测试发现也是如此:py . test按照固定、不可变且可预测规则检测测试模块中的测试,nose采用灵活可定制规则

    It is the same in this case: the rules by which tests are detected inside of a test module are fixed, invariant, and predictable for py.test, while they are flexible and customizable for nose.

    youdao

  • 对于测试发现也是如此:py . test按照固定、不可变且可预测规则检测测试模块中的测试,nose采用灵活可定制规则

    It is the same in this case: the rules by which tests are detected inside of a test module are fixed, invariant, and predictable for py.test, while they are flexible and customizable for nose.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定