speed of detection meaning in English
探测速度
Examples
- Further more , the ids ' s speed of detection is improved through the decrease of the times of detection to network - packet by applying new characteristic - string matching algorithm
其中,还重点对如何提高模式匹配的效率进行了研究,并实现了一个高效率的模式匹配算法。 - The integral image is used to calculate sub - block ' s statistic value , and it degrades the computational complexity from o ( n5 ) to o ( n3 ) , thus the speed of detection is improved remarkably
从而在不降低检测精度的情况下,使检测的时间复杂度由o ( n ~ 5 )降低到o ( n ~ 3 ) ,缩短了人脸检测的时间。 - The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process , and set up a fuzzy sub collection b with real time transfer array , then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid , can not only reduce efficiently false positive rate and false negative rate , also make real time intrusion detection to become possibility ; have independent and complete character database , according to the classification of monitoring program , design normal behavior and anomaly behavior etc . , have raised the strongness of ids ; use tree type structure to preservation the character database , have saved greatly stock space ; in detection invade , carry out frequency prior principle , prior analysis and handling the behavior feature of high frequency in information table , have raised efficiency and the speed of detection , make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection , have remedied deficiency of unitary detection method
这种方法的实质是在监控特权进程的正常系统调用基础上建立正常行为模糊子集a ,用检测到的实时调用序列建立模糊子集b ,然后用模糊识别方法中的最小距离原则进行检测。本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于euclidean距离的入侵检测方法edid ,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。