• To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.

    研究实现基于网络行为分析未知恶意代码检测系统有效地对未知恶意代码进行检测

    youdao

  • Honeypot system in the accommodate and capture the attackers activities are highly effective, but the network behavior data analysis is a complicated and arduous task.

    蜜罐系统容纳捕获攻击者活动方面极为有效的,但是网络行为数据分析一个复杂艰巨工作

    youdao

  • Analysis E-learning behavior is the prerequisite to launch the network instruction system design and develop the educational resources online.

    网络学习行为分析开展网络教学系统设计网络教育资源开发前提

    youdao

  • Based on the analysis of pilot behavior character a nd control mode, the predictive control ANN (artificial neural network) model is established according to the theory of prediction-following.

    分析驾驶员行为特性和行为操纵基础根据预测跟随理论建立了驾驶员预测控制神经网络ANN模型

    youdao

  • Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.

    通过实例分析证明了算法模型适合全面分析网络安全性攻击可能采取行为方式

    youdao

  • According to social network analysis theory, a large number of abnormal behaviors are always hidden in the normal mode of behavior.

    根据社会网络分析理论异常行为总是隐藏大量正常行为模式

    youdao

  • The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.

    其中,基于主机完整性检测技术以及基于网络流量分析技术用户行为管理软件已经基本成熟用于商业用途。

    youdao

  • The fifth case is analysis the call loss, analysis the value of the various reasons for the failure, find out which is user behavior reason and which is the network problems.

    第五例子分析,分析各个失败原因找出用户行为网络问题等

    youdao

  • By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    通过网络数据包分析挖掘出网络系统中频繁发生行为模式,运用模式相似比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。

    youdao

  • Cyber attack behavior analysis techniques can be roughly classified as network-oriented analysis and attacker-oriented analysis.

    现有攻击行为分析技术大致可以分为“面向网络”“面向攻击者”两类

    youdao

  • A numerical analysis of a small network shows that the proposed model can reflect the real behavior of travelers in route choice from a stochastic transportation network.

    最后在一个小型测试网络模型分配结果进行了测试,测试结果符合实际情况,表明模型能够较好地反映出行者路径选择行为

    youdao

  • A numerical analysis of a small network shows that the proposed model can reflect the real behavior of travelers in route choice from a stochastic transportation network.

    最后在一个小型测试网络模型分配结果进行了测试,测试结果符合实际情况,表明模型能够较好地反映出行者路径选择行为

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定