ID |
原文 |
译文 |
45936 |
从恶意代码提取的 API 调用图,能够有效表示恶意代码的行为信息,但由于求解子图同构问题的算法复杂度较高,使基于图结构特征的恶意代码分析效率较低。 |
API call graph of malware can represent the behavior of it. Because of the sub-graph isomorphism algorithm has high complexity, the analysis of malware based on the graph structure with low efficiency. |
45937 |
为此,提出了利用卷积神经网络对恶意代码 API 调用图进行处理的方法。 |
Therefore, this studies a homology analysis method of API graph of malware that use convolutional neural network. |
45938 |
通过选择关键节点,以关键节点邻域构建感知野,使图结构数据转换为卷积神经网络能够处理的结构。 |
By selecting the key nodes, and construct neighborhood receptive field, the convolution neural network can handle graph structure data. |
45939 |
通过对 8 个家族的恶意样本进行学习和测试,实验结果表明,恶意代码同源性分析的准确率达到 93%,并且针对恶意代码检测的准确率达到 96%。 |
Experimental results on 8 real-world malware family, shows that the accuracy rate of homology malware analysis achieves 93%, and the accuracy rate of the detection of malicious code to 96%. |
45940 |
通过论述空间信息及其表征的概念、内涵及发展现状,结合形式概念分析的内容,从空间信息形式背景、概念格和蕴含关系 3 方面建立了空间信息表征模型。 |
By discussing the concept, connotation and development situation of SI and its representation, and combining the content of FCA, the SIR model was established from there aspects including SI formal context, SI concept lattice Andes implication relation. |
45941 |
以部分空间实体集和空间数据集作为输入,基于 ConceptExplorer 平台实现了该表征模型在空间信息网络中的具体应用,通过该实例也验证了该空间信息表征模型的有效性和可行性。 |
Taking part of space entity sets and space data sets as input, the specific application of represents-tion model on SIN was realized based on concept explorer platform, meanwhile, the effectiveness and feasibility of theSIR model was also validated by this example. |
45942 |
基于形式概念分析的空间信息表征模型旨在为空间信息网络基础理论和关键技术的研究提供信息表征方面的支撑。 |
Of course, the aim of the model was to provide information representation support for the basic theory and key technical research of SIN. |
45943 |
温室培养液中一些重要营养元素的浓度往往被忽视并且 ZigBee 监测系统的核心节点协调器容易遭受捕获攻击。 |
In the greenhouse environment, the concentration of nutrient solution was always ignored. At the same time,the core node coordinator of the ZigBee wireless monitoring system was easily compromised. |
45944 |
设计可信溶液监测系统各节点硬件结构、外部电压测量过程和数据清洗过程。 |
A trusted solution monitoring system based on ZigBee wireless sensor network was designed and implemented. Firstly the hardware structure of sensor, router and coordinator was introduced. Then the processes of external voltage measurement and data cleaning were illustrated. |
45945 |
为协调器节点配备可信模块,设计针对协调器的可信 u-boot,对关键文件进行完整性检查,实现节点可信启动。 |
For realizing the trusted boot of the coordinator, trusted u-boot to measure the integrity of some key files was designed. |