您要查找的是不是:
- But, It is limited to use anomaly detection and misuse detection in practice. 但是在实际中的应用仍然局限于异常检测和误用检测。
- Login Anomaly Detection System - The Login Anomaly Detection System (LADS) detects anomalies in logins and logouts and is able to perform various actions in response. 检测输入日志和输出日志中的异常,能以各种动作做出响应。
- Secondly, RX, GMRF and SEM, three representational algorithms of anomaly detection are studied. 其次,研究了具有代表性的三种奇异检测算法:RX算法、基于高斯马尔可夫随机场模型(GMRF)的检测算法和基于随机最大期望(SEM)分类的检测算法。
- This article presents a anomaly detection method based on correlation eigen matrix and neural network. 摘要 本文描述了一个基于相关特征矩阵和神经网络的异常检测方法。
- In middle and high mountain areas, the landform is complex, the flying altitude should be relatively high, and the intensity of magnetic anomalies detected by aeromagnetic survey is hence relatively weak. 摘要中高山地区的地形复杂,飞行高度较高,航磁测量获得的磁异常强度相对弱小。
- In order to make the anomaly detection more efficiently,the model adopts a traffic update policy based on glide window. 采用一个基于滑动窗口的流量更新策略,使异常检测能够更加高效。
- An approach of hyperspectral anomaly detection based on iterative error analysis (IEA) is presented. 摘要提出了一种基于迭代误差分析法(IEA)的异常检测算法。
- On the basis of the current single layer Markov chain anomaly detection model, this paper proposes a new two-layer model. 在现有的单层马尔科夫链异常检测模型基础上;提出一种崭新的两层模型.
- Because of the scalability of finite automaton,the intrusion detection system was made to be of certain anomaly detection capabilities. 由于解析自动机的可扩展性,使其具备一定的异常检测能力。
- Using experiments on network traffic analysis, the feasibility of updating normal profile for anomaly detection system is validated. 并以网络流量分析为例,验证了在异常检测中应用这一方法的可行性。
- Some in the financial community are also putting anomaly detection in the back ends to detect suspicious patterns and localizations. 有些金融业者也在后端导入异常行为侦测的机制,以便及时发现可疑模式与地点。
- A set of special spectra which can be extracted by using IEA are important priori information in anomaly detection algorithm. IEA算法能够提取图像中有代表性的光谱信息,可为异常检算子的构造提供端元信息。
- Its implement and performance are analyzed.The advantages and disadvantages of misuse detection and anomaly detection are respectively analyzed. 论文分析了入侵检测系统的实现方式和安全性能,介绍了误用检测与异常检测各自的优缺点。
- Normal pattern construction is the key step for anomaly detection systems, which surely includes the low-frequency pattern as well as high-frequency pattern. 异常检测系统中,在建立正常模式时必须尽可能多得对网络行为进行全面的描述,其中包含出现频率高的模式,也包含低频率的模式。
- This paper introduces an user behavior anomaly detection model based on machine learning originated mainly by Terran Lane. Then it presents an improved anomaly detection model. 该文对一种基于机器学习的用户行为异常检测模型进行了描述 ;在此基础上提出一种改进的检测模型 .
- This paper proposes an anomaly detection based on Web user access behavior for the defense of application layer Distributed Denial-of-Service (DDoS) attack. 提出一种基于Web用户访问行为的异常检测方案;用于检测应用层上的分布式拒绝服务攻击;并以具有非稳态流特性的大型活动网站为例;进行应用研究.
- Then, in the light of well-established theory of DoS attack, it is suggested to employ IDS to defend, including anomaly detection,arbitrary detection, and data mining. 在本文中,作者重点将建立一个抗DOS攻击的模型,该模型利用数据挖掘(DM)原理,采用关联规则算法、序列模式算法和BP网络算法作为判断攻击的主要理论依据。
- A novel online fault detection algorithm based on adaptive auto-regressive (AAR) model is proposed focusing on the anomaly detection of network traffic. 通过研究网络流量异常检测;提出一种新的基于自适应自回归(AAR)模型的在线故障检测算法.
- TIAN X G. Anomaly detection methods for host-based intrusion detection systems [D]. Changsha: Graduate School of National University of Defense Technology, 2005(in Chinese). 田新广.;基于主机的入侵检测方法研究[D]
- Focus on design and implementation of K-Means-based anomaly detection algorithm engine and cluster analysis module, as well as the Apriori algorithm based on correlation analyzer. 重点设计和实现了基于K-Means 算法的异常检测引擎和聚类分析模 块,以及基于Apriori 算法的关联分析器。
