• Something to keep in mind with steganalysis techniques is that another layer of complexity may be added to the detection of hidden data.

    对于写式密码解密技术需要记住一点另一个复杂可能添加隐藏数据。

    youdao

  • Aiming at the weaknesses of current unsupervised anomaly detection techniques, a measurement approach about samples distribution of anomaly data is proposed.

    针对现有无监督异常检测技术不足之处提出了一种基于样本分布异常数据实例度量方法

    youdao

  • Mode s Extended Squitter Enhanced Reception Techniques, including preamble detection, re-triggering and data process, are investigated in detail.

    详细研究模式s扩展应答信号增强接收技术包括报头检测、重触发数据处理等。

    youdao

  • In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.

    本文对基于数据挖掘入侵检测基本思想技术了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。

    youdao

  • In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.

    本文对基于数据挖掘入侵检测基本思想技术了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定