If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.
如果一个实际的入侵检测系统不对数据进行处理,则无法准确地检测到入侵行为。
Application of criminal silence right has negative effect on criminal detection behavior but is helpful to improve criminal detection behavior and promote criminal detection work.
应用刑事沉默权对刑事侦查行为虽然具有一些消极作用,但从总体上看,是有利于提升刑事侦查行为,推动刑事侦查工作的。
Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
Behavior-based analysis of currently unknown virus detection methods, necessary to run an executable file can be detected after, can not be detected in static form of computer virus file.
目前基于行为分析的未知病毒检测方法,需要可执行文件运行后才能检测到,无法检测出以静态形式存在计算机中的病毒文件。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
The New Volume Detection feature may show inconsistent behavior.
新卷检测功能可能出现不一致的行为。
The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.
其中规则库中包含正常行为规则和异常行为规则,使得原型系统在理论上既可实现误用检测也可实现异常检测,并采用关联规则挖掘模块对网络连接数据进行处理。
Detection of multiple oncogenes was helpful of pathological analysis and observation of biological behavior.
多项癌基因的检测有助于脑胶质瘤的病理分析和生物学行为观察。
The idea is to transform the net audit data into time series database and mine the sequence pattern to extract the user behavior pattern , and then to use behavior pattern in anomaly detection.
其思想是通过将网络审计数据转化为时序数据库,对其进行序列模式挖掘以提炼出用户行为模式,并由此进行异常检测。
A traffic behavior pattern learning method was presented for realizing automatic traffic event detection based on video.
提出了一种用于基于视频的交通事件自动检测的交通行为模式学习方法。
When applying the algorithm to network behavior intelligent learning of intrusion detection system, the error rate is about 10%.
将该算法应用于入侵检测系统的网络行为智能学习,其误报率仅为10%左右。
In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.
如果一个实际的入侵行为稍有偏差就有可能与正常的模式相匹配,而异常检测系统则无法检测到这种入侵行为。
It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.
基于程序行为的异常检测方法主要通过建立程序正常行为模式库来检测入侵。
This paper presents a model of database intrusion detection system, which USES data mining on the audit data in database systems to derive user profiles that describe normal behavior of users.
提出了一种数据库入侵检测模型,利用该模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为的用户轮廓。
The criminal intent suggestion enticement detection is to the person who does not have the criminal intent, we adopt the initiative positive behavior and entices him to implement the crime intensely.
犯意诱发型诱惑侦查是对没有犯罪意图的人采取主动积极的行为,强烈诱惑其实施犯罪。
In the trial practice, the accused person proposed to have the extortion of confession by torture behavior in front of the courtyard in the detection places on trial.
审判实践中,有的被告人提出侦查人员在侦查讯问等庭前审判阶段有刑讯逼供行为。
The algorithm is mainly composed of image preprocessing, the vehicle motion detection and behavior analysis based on optical flow.
算法主要包括图像的预处理,车辆的运动检测和基于光流场的行为分析。
Intrusion detection is an active defense measure that can monitor the dynamic behavior characteristic of network or computer system and then examine whether there is any intrusion.
入侵检测是监控网络或计算机系统的动态行为特征,并据此判断是否有入侵的主动防御措施。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
Based on previous models, a model of human multitask event detection was developed in terms of the human behavior characteristics.
本文在原有模型的基础上,根据人的具体行为特点,提出了一个人的多任务事件检测模型。
At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.
同时,当前的恶意代码发现技术还是以特征码扫描为主,辅助以启发式扫描,行为检测法等检测方法为辅。
In this way, the trajectory distribution patterns can be learned. Using the learned patterns, the authors consider both local and global anomaly detection as well as object behavior prediction.
还给出了利用轨迹分布模式检测出局部可能的异常现象、检测整个运动轨迹所表示的事件是否为异常事件和目标行为预测的方法。
The establishment of network behavior detection model resolves theses problems.
网络行为检测模型的建立,在一定程度上解决了上述问题。
The detection model outlined in this paper would be able to help the network managers to find the anomaly behavior, which has high practical value.
本文提出的网络行为检测模型可以有效地帮助网管人员及时发现网络中的异常行为,为网络管理人员提供便利,具有较强的实用价值。
Visual analysis of human motion focuses on people from the movement in the image sequence detection, extraction, tracking people and their behavior understanding and description.
人体运动视觉分析的研究内容,就是从包含人运动的图像序列中检测、提取、跟踪人并对其行为进行理解和描述。
We focus on the issues related to found a HMM for the behavior of system, and bring forward an algorithm of anomaly detection relied on node.
首先建立了系统运行的HMM,在此模型基础上提出了依赖于节点的异常检测算法。
To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.
研究并实现基于网络行为分析的未知恶意代码检测系统,有效地对未知恶意代码进行检测。
S100A2 protein is a kind of cancer inhabiting gene, the detection of S100A2 protein expression may be one of the reference index for the judgment of biological behavior of the cells of LSCC.
S100A2在喉鳞癌中为抑癌基因,对S100A2蛋白表达的检测,可能成为判断喉鳞癌细胞生物学行为的参考指标之一。
S100A2 protein is a kind of cancer inhabiting gene, the detection of S100A2 protein expression may be one of the reference index for the judgment of biological behavior of the cells of LSCC.
S100A2在喉鳞癌中为抑癌基因,对S100A2蛋白表达的检测,可能成为判断喉鳞癌细胞生物学行为的参考指标之一。
应用推荐