• In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式

    youdao

  • Based on previous models, a model of human multitask event detection was developed in terms of the human behavior characteristics.

    本文原有模型基础上,根据的具体行为特点,提出一个人的多任务事件检测模型

    youdao

  • A traffic behavior pattern learning method was presented for realizing automatic traffic event detection based on video.

    提出用于基于视频的交通事件自动检测的交通行为模式学习方法

    youdao

  • It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.

    基于程序行为异常检测方法主要通过建立程序正常行为模式检测入侵。

    youdao

  • Based on electrochemistry, this thesis investigated the electrochemical behavior of varieties of biomolecules and realized in vivo detection of plant using electrochemical sensor.

    本文采用电化学方法,对不同生物分子电化学行为进行了探讨研究了生物电化学传感器的植物活体检测

    youdao

  • Behavior-based analysis of currently unknown virus detection methods, necessary to run an executable file can be detected after, can not be detected in static form of computer virus file.

    目前基于行为分析未知病毒检测方法需要执行文件运行才能检测到,无法检测出静态形式存在计算机中的病毒文件。

    youdao

  • Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测的关键

    youdao

  • The algorithm is mainly composed of image preprocessing, the vehicle motion detection and behavior analysis based on optical flow.

    算法主要包括图像预处理车辆运动检测基于流场行为分析

    youdao

  • As to the peccant overspeed behavior of vehicles in expressway, this paper studies a detection and judgment arithmetic of peccant overspeed behavior based on virtual video detection lines.

    针对高速公路车辆违章超速行为给出了一种基于虚拟视频检测线车辆速度检测违章超速行为判定的实用算法

    youdao

  • At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.

    同时当前恶意代码发现技术还是以特征码扫描为主,辅助启发式扫描,行为检测法检测方法为辅

    youdao

  • The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.

    其中,基于主机完整性检测技术以及基于网络流量分析技术用户行为管理软件已经基本成熟用于商业用途。

    youdao

  • To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.

    研究实现基于网络行为分析未知恶意代码检测系统有效地对未知恶意代码进行检测

    youdao

  • This paper introduces an user behavior anomaly detection model based on machine learning originated mainly by Terran Lane. Then it presents an improved anomaly detection model.

    该文对种基于机器学习用户行为异常检测模型进行描述,在此基础提出一种改进的检测模型。

    youdao

  • Mamutu is a pure behavior blocker without signature based detection. mamutu 1.

    一个纯粹行为阻滞剂没有签字基于侦查。

    youdao

  • Mamutu is a pure behavior blocker without signature based detection. mamutu 1.

    一个纯粹行为阻滞剂没有签字基于侦查。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定