The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
Using this table function instead of db2pd simplifies evaluation of the results because the index IDs (IIDs) can be converted to index names by joining with the SYSCAT.INDEXES catalog view.
使用表函数取代 db2pd实用程序简化了结果计算,因为可以通过与 SYSCAT.INDEXES 目录视图结合将索引IDs (IIDs)转换成索引名。
Using this table function instead of db2pd simplifies evaluation of the results because the index IDs (IIDs) can be converted to index names by joining with the SYSCAT.INDEXES catalog view.
使用表函数取代 db2pd实用程序简化了结果计算,因为可以通过与 SYSCAT.INDEXES 目录视图结合将索引IDs (IIDs)转换成索引名。
应用推荐