The approach mines detection rule models from network connection data.
该方法使用Rough set理论对网络连接数据提取检测规则模型。
参考来源 - 基于Rough Set理论的网络入侵检测系统研究·2,447,543篇论文数据,部分数据来源于NoteExpress
需要有威胁检测规则并执行安全策略。
Threat detection rules and security policy enforcement are needed.
内存泄漏检测规则是按照一种简单的理念设计的。
The memory leak detection rule was designed in accordance with a simple philosophy.
它为解决方案构建者和用户提供了一个平台,用于编写有关数据模式的检测规则。
It provides a platform for solution builders and users to write detection rules on patterns of data.
应用推荐