| 1. | A new anomaly detection technology in mobile ad - hoc networks 网络异常入侵检测技术 |
| 2. | Real - time anomaly detection of network intrusions 网络入侵异常检测的实时方法 |
| 3. | A method for data flow anomaly detection in oo programs 一种检查面向对象程序中数据流异常的方法 |
| 4. | A new anomaly detection model based on system call macro was presented 提出了一个基于系统调用宏的异常检测模型。 |
| 5. | A new anomaly detection model based on system call classification was presented 提出了一个基于系统调用分类的异常检测模型。 |
| 6. | In the sixth chapter the application of sequence models to anomaly detection is studied 第六章是序列模式在异常检测中的应用。 |
| 7. | In the filed of intrusion detection , anomaly detection is an important branch 在入侵监测这个领域内,异常检测是一个重要分支。 |
| 8. | A new two - layer markov chains anomaly detection model that operated on system call traces was presented 提出了一个两层马尔可夫链异常入侵检测模型。 |
| 9. | The construction of network traffic usage profile is first important in anomaly detection 异常检测的难点在于怎样准确的描述用户行为模式轮廓( profile ) 。 |
| 10. | Describing normal behaviors is one of the difficulties that an anomaly detection system faces 对正常行为的描述是异常检测系统必须要解决好的核心问题之一。 |