Something to keep in mind with steganalysis techniques is that another layer of complexity may be added to the detection of hidden data.
对于隐写式密码解密技术需要记住的一点是,另一个复杂的层可能添加到隐藏数据。
Aiming at the weaknesses of current unsupervised anomaly detection techniques, a measurement approach about samples distribution of anomaly data is proposed.
针对现有的无监督异常检测技术的不足之处,提出了一种基于样本分布异常数据实例度量方法。
Mode s Extended Squitter Enhanced Reception Techniques, including preamble detection, re-triggering and data process, are investigated in detail.
详细研究了模式s扩展应答信号的增强接收技术,包括报头检测、重触发和数据处理等。
In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.
本文对基于数据挖掘的入侵检测的基本思想和技术等作了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。
In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.
本文对基于数据挖掘的入侵检测的基本思想和技术等作了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。
应用推荐