ID | 原文 | 译文 |
5024 | 仿真结果表明,所提方法可以明显地提升运算效率,具有高效精确的成像性能。 | The simulation results show that proposed method can improve the efficiency, accurate imaging performance with efficient. |
5025 | 基于改进的 FEMD 算法提出了一种可逆秘密图像共享方案。 | Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed. |
5026 | 首先改进秘密数据的嵌入过程,使原始像素对和嵌入后含密像素对成为一对一的映射; | Firstly, theembedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become aone-to-one mapping. |
5027 | 然后通过设置溢出标识位来记录溢出像素对的原始值并进行相应处理。 | Then a unique status flag was set to be calculated to record and process the original status of theover flow pixel-pair. |
5028 | 实验数据和分析表明,所提算法可以在保证生成高质量的含密图像的同时,解决不能恢复原始载体图像的问题。 | Experimental data and analysis show that the proposed algorithm can guarantee the generation ofhigh quality cryptographic images and solve the problem that the original carrier image can not be restored. |
5029 | 针对企业内部业务逻辑固定、进出网络访问行为受控等特点,首先定义了 2 类共 4 种异常行为,然后提出了基于网络通信异常识别的多步攻击检测方法。 | In view of the characteristics of internal fixed business logic, inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly, and then a multi-step attack detection method wasproposed based on network communication anomaly recognition. |
5030 | 针对异常子图和异常通信边 2 类异常,分别采用基于图的异常分析和小波分析方法识别网络通信过程中的异常行为,并通过异常关联分析检测多步攻击。 | For abnormal sub-graphs and abnormal communicationedges detection, graph-based anomaly analysis and wavelet analysis method were respectively proposed to identify ab-normal behaviors in network communication, and detect multi-step attacks through anomaly correlation analysis. |
5031 | 分别在 DARPA 2000数据集和 LANL 数据集上进行实验验证,实验结果表明,所提方法可以有效检测并重构出多步攻击场景。 | Expe-riments are carried out on the DARPA 2000 data set and LANL data set to verify the results. The experimental results show that the proposed method can effectively detect and reconstruct multi-step attack scenarios. |
5032 | 所提方法可有效监测包括未知特征攻击类型在内的多步攻击,为检测 APT 等复杂的多步攻击提供了一种可行思路,并且由于网络通信图大大减小了数据规模,因此适用于大规模企业网络环境。 | The proposed methodcan effectively monitor multi-step attacks including unknown feature types. It provides a feasible idea for detecting com-plex multi-step attack patterns such as APT. And the network communication graph greatly reduces the data size, it is suitable for large-scale enterprise network environments. |
5033 | 针对复杂网络环境中数据跨域流转后的受控共享,提出了一种延伸访问控制机制。 | Aiming at the controlled sharing for cross-domain data exchange for complicated application systems, an ex-tended access control mechanism was proposed. |