Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
Event log is one of the most information sources about analysis of fault in modern IT system.
事件日志是现代IT系统中分析和处理故障的重要信息来源。
UE log analysis is one of the key methods of trouble location in WCDMA system test.
在WCDMA系统测试中,分析手机日志是故障定位的重要手段之一。
Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.
重新设计并实现了计算机日志勘察取证系统日志分析平台。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.
本操作规程所称其他操作是指疑义信息反馈、核查日志查询、统计分析、系统管理等操作。
An exact statistical fit and auto-correction system for neutron log data has been set up with the use of image network statistics, network weighted analysis (algorithm) and fit.
利用图象网络统计、拟合、加权分析技术,提出中子测井资料环境影响校正分析方法和处理模式,建立起精细的统计、拟合自动分析校正系统。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
应用推荐