Another highlight of the architecture is introduction of data mining technique . ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream , and then constructs classify engine of audit data 本文提出的体系结构中还引入了数据挖掘思想,利用数据挖掘技术中的关联分析、分类等算法从系统日志、系统调用序列、网络流等海量的安全审计数据中提取关键的系统特征属性,根据这些属性生成安全审计数据的分类模型用于入侵检测。
According to the financial simulation , the collaterals are divided into three groups : 1 . for the collaterals having the characters which the objects sold before the second bid had , the financial institutions could take the way of legal auctions ; 2 . for the collaterals having the characters which the objects sold on the third bid had , the financial institutions could take auction by themselves ; 3 . for the collaterals having the characters which the objects sold after the special ( fourth ) bid had , the financial institutions may consider to sell the , asset management company ( amc ) 文中以个案财务分析仿真方式之结果将担保品分成三类:若担保品有二拍前拍定之特征属性倾向时,银行可考虑采法拍处理;若银行评估担保品有第三拍拍定者之特征属性倾向时,则此类担保品可采银行自行委托拍卖处理;若银行评估担保品有四拍后拍定者之特征属性倾向时,则可考虑让售给资产管理公司处理。