• Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.

    并根据目标对攻击信息进行分类LCS算法同类攻击数据生成网络病毒特征

    youdao

  • Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.

    并根据目标对攻击信息进行分类LCS算法同类攻击数据生成网络病毒特征

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定