您要查找的是不是:
- This article presents a anomaly detection method based on correlation eigen matrix and neural network. 摘要 本文描述了一个基于相关特征矩阵和神经网络的异常检测方法。
- In order to make the anomaly detection more efficiently,the model adopts a traffic update policy based on glide window. 采用一个基于滑动窗口的流量更新策略,使异常检测能够更加高效。
- An approach of hyperspectral anomaly detection based on iterative error analysis (IEA) is presented. 摘要提出了一种基于迭代误差分析法(IEA)的异常检测算法。
- This paper introduces an user behavior anomaly detection model based on machine learning originated mainly by Terran Lane. Then it presents an improved anomaly detection model. 该文对一种基于机器学习的用户行为异常检测模型进行了描述 ;在此基础上提出一种改进的检测模型 .
- This paper proposes an anomaly detection based on Web user access behavior for the defense of application layer Distributed Denial-of-Service (DDoS) attack. 提出一种基于Web用户访问行为的异常检测方案;用于检测应用层上的分布式拒绝服务攻击;并以具有非稳态流特性的大型活动网站为例;进行应用研究.
- A novel online fault detection algorithm based on adaptive auto-regressive (AAR) model is proposed focusing on the anomaly detection of network traffic. 通过研究网络流量异常检测;提出一种新的基于自适应自回归(AAR)模型的在线故障检测算法.
- Focus on design and implementation of K-Means-based anomaly detection algorithm engine and cluster analysis module, as well as the Apriori algorithm based on correlation analyzer. 重点设计和实现了基于K-Means 算法的异常检测引擎和聚类分析模 块,以及基于Apriori 算法的关联分析器。
- But, It is limited to use anomaly detection and misuse detection in practice. 但是在实际中的应用仍然局限于异常检测和误用检测。
- Use data mining methods to analyze the audit data and provide anomaly detection based on the generated normal patterns, this method can improve the performance of intrusion detection system. 利用数据挖掘技术对审计数据加以分析,总结出一些正常模式,用来进行异常检测,将有助于提高入侵检测系统的检测准确性和完备性。
- It has proved that performances of anomaly detection can be improved to a great degree and the FPP and FNP can be cut down prominently in an IDS based on the mixed quadratic network states model MQNSM-G(DKS,DKKS,DAKS). 基于混合二次网络状态模型MQNSM-G(DKS,DKKS,DAKS)的入侵检测系统进一步证明了该模型可以更大程度上提高异常检测性能,降低其误检率和漏检率。
- A new anomaly detection method based on HMMs is presented for Intrusion Detection Systems.We demonstrate that the new method has more sensitivity to the abnormals and lower false positives. 为此我们时HMM的异常检测方法作了进一步改进,改进后的方法对异常更敏感,误报率更低。
- host based intrusion detection system 主机入侵检测系统
- Secondly, RX, GMRF and SEM, three representational algorithms of anomaly detection are studied. 其次,研究了具有代表性的三种奇异检测算法:RX算法、基于高斯马尔可夫随机场模型(GMRF)的检测算法和基于随机最大期望(SEM)分类的检测算法。
- On the basis of the current single layer Markov chain anomaly detection model, this paper proposes a new two-layer model. 在现有的单层马尔科夫链异常检测模型基础上;提出一种崭新的两层模型.
- Because of the scalability of finite automaton,the intrusion detection system was made to be of certain anomaly detection capabilities. 由于解析自动机的可扩展性,使其具备一定的异常检测能力。
- Using experiments on network traffic analysis, the feasibility of updating normal profile for anomaly detection system is validated. 并以网络流量分析为例,验证了在异常检测中应用这一方法的可行性。
- Some in the financial community are also putting anomaly detection in the back ends to detect suspicious patterns and localizations. 有些金融业者也在后端导入异常行为侦测的机制,以便及时发现可疑模式与地点。
- The host then passed around a box of cigars. 主人这时拿了一盒雪茄烟请大家抽。
- A set of special spectra which can be extracted by using IEA are important priori information in anomaly detection algorithm. IEA算法能够提取图像中有代表性的光谱信息,可为异常检算子的构造提供端元信息。
- Building a Network Virtual Host Based on ARP 基于ARP协议构建网络虚拟主机