To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.
研究并实现基于网络行为分析的未知恶意代码检测系统,有效地对未知恶意代码进行检测。
Honeypot system in the accommodate and capture the attackers activities are highly effective, but the network behavior data analysis is a complicated and arduous task.
蜜罐系统在容纳和捕获攻击者活动方面是极为有效的,但是网络行为数据分析是一个复杂、艰巨的工作。
Analysis E-learning behavior is the prerequisite to launch the network instruction system design and develop the educational resources online.
网络学习行为分析是开展网络教学系统设计和网络教育资源开发的前提。
Based on the analysis of pilot behavior character a nd control mode, the predictive control ANN (artificial neural network) model is established according to the theory of prediction-following.
在分析驾驶员行为特性和行为操纵的基础上,根据预测跟随理论,建立了驾驶员预测控制神经网络(ANN)模型;
Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.
通过实例分析证明了算法模型适合全面分析网络安全性和攻击者可能采取的行为方式。
According to social network analysis theory, a large number of abnormal behaviors are always hidden in the normal mode of behavior.
根据社会网络分析理论,异常行为总是隐藏在大量的正常行为模式中。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
The fifth case is analysis the call loss, analysis the value of the various reasons for the failure, find out which is user behavior reason and which is the network problems.
第五个例子是呼损分析,分析各个失败的原因值,找出用户行为、网络问题等。
By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.
通过对网络数据包的分析,挖掘出网络系统中频繁发生的行为模式,并运用模式相似度比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。
Cyber attack behavior analysis techniques can be roughly classified as network-oriented analysis and attacker-oriented analysis.
现有攻击行为分析技术大致可以分为“面向网络”和“面向攻击者”两类。
A numerical analysis of a small network shows that the proposed model can reflect the real behavior of travelers in route choice from a stochastic transportation network.
最后在一个小型测试网络上对模型分配结果进行了测试,测试结果符合实际情况,表明模型能够较好地反映出行者的路径选择行为。
A numerical analysis of a small network shows that the proposed model can reflect the real behavior of travelers in route choice from a stochastic transportation network.
最后在一个小型测试网络上对模型分配结果进行了测试,测试结果符合实际情况,表明模型能够较好地反映出行者的路径选择行为。
应用推荐