CN116560938A - Method, equipment and storage medium for rapidly analyzing logs - Google Patents
Method, equipment and storage medium for rapidly analyzing logs Download PDFInfo
- Publication number
- CN116560938A CN116560938A CN202310311478.5A CN202310311478A CN116560938A CN 116560938 A CN116560938 A CN 116560938A CN 202310311478 A CN202310311478 A CN 202310311478A CN 116560938 A CN116560938 A CN 116560938A
- Authority
- CN
- China
- Prior art keywords
- log
- logs
- running
- operation log
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000004458 analytical method Methods 0.000 claims abstract description 42
- 238000007781 pre-processing Methods 0.000 claims abstract description 5
- 238000004590 computer program Methods 0.000 claims description 6
- 230000014509 gene expression Effects 0.000 claims description 5
- 238000012423 maintenance Methods 0.000 abstract description 7
- 230000004044 response Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 239000010793 electronic waste Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/205—Parsing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application provides a method, equipment and storage medium for rapidly analyzing logs, wherein the method is applied to an industrial personal computer and comprises the following steps of: s1, acquiring an operation log generated in an operation process, and preprocessing the operation log; s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log; and step S3, displaying an analysis result of the operation log after analysis. The method and the system can quickly find out the problems in the operation log through the analysis result, are convenient for workers to verify the correctness of the data of the industrial personal computer, and find out the problems and daily operation and maintenance of the operation process of the industrial personal computer in advance.
Description
Technical Field
The application relates to the technical field of computers, in particular to a method, equipment and a storage medium for rapidly analyzing logs.
Background
An industrial personal computer operates to generate near hundred M plain text logs, and a few days are required for manual reading. Except for holidays, the industrial personal computer inside the factory basically operates for 24 hours. All customers add up, thousands of computers, and daily data are generated.
And different software presents logs in different formats, including, but not limited to: time for communicating with the PLC, time for using the whole process, received message and the like. But most of the log data becomes electronic waste to enter the recycling station. The processing of the industrial personal computer log has the following problems:
the log data is manually collected and summarized, and whether the data is lost or damaged cannot be confirmed; in the collecting process, log data is not subjected to preliminary processing, and the effective data is not more than 1K, so that the collecting and transmitting efficiency is affected; because the reading quantity of the log data is too large, only the problems can be generated, and related logs can not be found from a plurality of logs, the early warning and the prevention can not be carried out, and the inconvenience is caused to the processing and the daily operation maintenance of the problems of the industrial personal computer.
Disclosure of Invention
In order to solve the problems, the embodiments of the present application provide a method, an apparatus, and a storage medium for quickly analyzing a log, so as to quickly discover problems existing in an operation log, and facilitate the processing and daily operation and maintenance of the industrial personal computer problem.
The application provides a method for rapidly analyzing logs, which comprises the following steps:
a method for rapidly analyzing logs is applied to an industrial personal computer, and comprises the following steps:
s1, acquiring an operation log generated in an operation process, and preprocessing the operation log;
s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log;
and step S3, displaying an analysis result of the operation log after analysis.
Optionally, in combination with any one of the above aspects, in another implementation manner of this aspect, the method further includes:
and S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result.
Optionally, in combination with any one of the foregoing aspects, in another implementation manner of the present aspect, the running log is preprocessed in step S1, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, in step S2, the type of the running log is determined, and the running log is parsed according to a preset rule, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expressions; the simple type of travel log is parsed by the program code.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, the parsing the running log according to a preset rule further includes: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list.
Optionally, in combination with any one of the foregoing aspects, in another implementation manner of the present aspect, the time-of-use list includes average time-of-use, median time-of-use, and continuous maximum exceeding a threshold time-of-use, where the time-of-use list is accurate to milliseconds or microseconds.
Optionally, in combination with any one of the above aspects, in another implementation manner of the present aspect, the method further includes the following steps:
and S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, in step S11, whether the running log is a legal log is determined according to a thread id and a running time in the running log.
In another aspect of the present application, an electronic device is provided, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements a log rapid analysis method as described in any one of the above when executing the computer program.
In another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed, implements a log rapid analysis method as described in any of the above.
As described above, the present application provides a method, an apparatus, and a storage medium for rapidly analyzing a log, to obtain a running log generated in a running process, to preprocess the running log, to determine a type of the running log, to analyze the running log according to a preset rule corresponding to the type of the running log, to display an analysis result of the analyzed running log, and to rapidly discover problems existing in the running log through the analysis result, to facilitate a worker to verify the correctness of data of an industrial personal computer, and to discover problems in the running process and daily operation and maintenance of the industrial personal computer in advance.
The above summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. The above summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Fig. 1 is a schematic flow chart of a method for rapidly analyzing logs provided in the present application;
fig. 2 is a schematic diagram of an analysis matching interface in a log rapid analysis method provided in the present application;
FIG. 3 is a schematic diagram of a flow chart of analyzing an operation log in the method for rapidly analyzing logs provided in the present application;
fig. 4 is a schematic diagram of a display interface in a method for rapidly analyzing logs provided in the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element, and furthermore, elements having the same name in different embodiments of the present application may have the same meaning or may have different meanings, a particular meaning of which is to be determined by its interpretation in this particular embodiment or by further combining the context of this particular embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or," "and/or," "including at least one of," and the like, as used herein, may be construed as inclusive, or meaning any one or any combination. An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Referring to fig. 1, the present application provides a method, an apparatus, and a storage medium for quickly analyzing a log, so as to quickly find problems in an operation log, and facilitate the processing and daily operation and maintenance of problems of an industrial personal computer.
Specifically, the method comprises the following steps:
s1, acquiring an operation log generated in the operation process, and preprocessing the operation log. After the logs are obtained, all logs are first preprocessed, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0. In the application, whether the running log is legal or not is judged according to the thread id and the running time in the running log. When the thread id and the running time exist in the running log, the running log is considered to be a legal log, and when the thread id does not exist, the running log is considered to be an illegal log, and the illegal log is recorded as 0.
And S2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log. And reading the content of the running log according to the row, and judging the type of the running log according to the content so as to analyze according to different running logs and improve the analysis efficiency.
After the running log is obtained, the corresponding preset rule is matched through an IMatch matching structure, the factory interface is matched through an IMatchFactoy, and a matching object is created by a matching factory according to the requirement. And matching the processing threads in the matching entry class through the CMathAltThread to process multiple threads simultaneously, and distributing the preprocessed running logs to different matching objects according to the thread ids in the running logs. All classes are invoked indirectly through matching entry classes.
In the step S2, the type of the running log is determined, and the running log is parsed according to a preset rule corresponding to the type of the running log, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expression matching; regular expression (regular expression) describes a pattern of string matches that can be used to check whether a string contains a certain sub-string, to replace a matching sub-string or to fetch a sub-string from a certain string that meets a certain condition, etc. The simple type of travel log is parsed by program code matching. The method mainly determines the type of the operation log through the characteristics in the operation log, and is simple when single characteristics exist, and is complex when starting characteristics, ending characteristics and the like exist. More, complex types of travel logs can be matched and parsed through mathematical classes. The mathematical class encapsulates mathematical operations not provided by some systems, such as: and the maximum substring sum is used for meeting the analysis requirement of the operation log.
In the running log, cmatchpreendnotname: matching objects having different start characteristics and end characteristics. For example, a certain match is performed, the start characteristic is CHiKCamera:DataCallBack:begin, and the end characteristic is CHiKCamera:DataCallBack:end.
Cmatchpreendname: single feature matching. Characterized by "ZF11108", a second log comprising ZF11108 and a first log comprising ZF11108 are time-of-use, a third log comprising ZF11108 and a second log comprising ZF11108 are time-of-use.
The parsing process is shown in fig. 2 and 3, and the parsing the running log according to a preset rule further includes: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list. The time-of-use list includes average time-of-use, median time-of-use, continuous maximum over threshold time-of-use, the time-of-use list being accurate to milliseconds or microseconds.
And step S3, displaying an analysis result of the operation log after analysis. As shown in fig. 4, after analysis, the content of the running log can be directly displayed, so that a worker can quickly look up the effective content of the running log, and the format file in the running log is not required to be read, so that the running and maintenance efficiency is improved.
And S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result. When a worker needs to query the operation log of a certain time period or a certain industrial personal computer, the worker can input characteristic information required by querying the operation log, such as a specific certain time period, the serial number of the industrial personal computer, a start characteristic or an end characteristic and the like. After the characteristic information is obtained, the operation log which accords with the characteristic information is directly matched in the analysis result. Matching in the analysis result, namely matching the operation log meeting the conditions from the operation log after the rapid analysis, does not need to analyze all logs, can accurately and rapidly determine the required log, and is convenient for the staff to search.
And S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server. And when the industrial personal computer or the network meets the transmission requirement, uploading the analysis result of the running log to a log server. And a worker can upload analysis results of a plurality of operation logs through the log server to perform operation analysis of the industrial personal computers or big data joint analysis of the industrial personal computers, so that the operation condition of the industrial personal computers can be timely and quickly known, and early warning and prevention can be performed.
The application provides a method, equipment and a storage medium for rapidly analyzing logs, which are used for acquiring the running logs generated in the running process, preprocessing the running logs, judging the types of the running logs, analyzing the running logs according to preset rules corresponding to the types of the running logs, displaying analysis results of the analyzed running logs, rapidly finding out problems in the running logs through the analysis results, and facilitating staff to verify the data correctness of an industrial personal computer, and finding out problems and daily operation and maintenance of the industrial personal computer in the running process in advance.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In this application, the same or similar term concept, technical solution, and/or application scenario description will generally be described in detail only when first appearing, and when repeated later, for brevity, will not generally be repeated, and when understanding the content of the technical solution of the present application, etc., reference may be made to the previous related detailed description thereof for the same or similar term concept, technical solution, and/or application scenario description, etc., which are not described in detail later.
In this application, the descriptions of the embodiments are focused on, and the details or descriptions of one embodiment may be found in the related descriptions of other embodiments.
The technical features of the technical solutions of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the present application.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, comprising several instructions for causing a terminal device (which may be a consumer or a network device, etc.) to perform the method of each embodiment of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.
Claims (10)
1. The method is characterized by being applied to an industrial personal computer and comprising the following steps of:
s1, acquiring an operation log generated in an operation process, and preprocessing the operation log;
s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log;
and step S3, displaying an analysis result of the operation log after analysis.
2. A method of rapid analysis of logs as defined in claim 1, wherein: further comprises:
and S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result.
3. A method of rapid analysis of logs as defined in claim 2, wherein: in the step S1, the running log is preprocessed, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0.
4. A method of rapid analysis of logs as defined in claim 3 wherein: in the step S2, the type of the running log is determined, and the running log is parsed according to a preset rule, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expressions; the simple type of travel log is parsed by the program code.
5. The method for rapidly analyzing logs according to claim 4, wherein: the analyzing the operation log according to the preset rule further comprises: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list.
6. The method for rapidly analyzing logs according to claim 5, wherein: the time-of-use list includes average time-of-use, median time-of-use, continuous maximum over threshold time-of-use, the time-of-use list being accurate to milliseconds or microseconds.
7. A method of rapid analysis of logs as defined in claim 2, wherein: the method also comprises the following steps:
and S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server.
8. A method of rapid analysis of logs as defined in claim 3 wherein: in the step S11, whether the running log is legal is determined according to the thread id and the running time in the running log.
9. An electronic device, comprising a processor, a memory and a computer program stored in the memory and operable on the processor, wherein the processor implements a method for rapidly analyzing logs according to any one of claims 1 to 8 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed, implements a method for rapid analysis of logs according to any of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310311478.5A CN116560938A (en) | 2023-03-28 | 2023-03-28 | Method, equipment and storage medium for rapidly analyzing logs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310311478.5A CN116560938A (en) | 2023-03-28 | 2023-03-28 | Method, equipment and storage medium for rapidly analyzing logs |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116560938A true CN116560938A (en) | 2023-08-08 |
Family
ID=87495511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310311478.5A Pending CN116560938A (en) | 2023-03-28 | 2023-03-28 | Method, equipment and storage medium for rapidly analyzing logs |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116560938A (en) |
-
2023
- 2023-03-28 CN CN202310311478.5A patent/CN116560938A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7561742B2 (en) | Apparatus and methods for converting raster illustrated parts images into intelligent vector-layered files | |
CN111553137B (en) | Report generation method and device, storage medium and computer equipment | |
CN112116168B (en) | User behavior prediction method and device and electronic equipment | |
CN113159246B (en) | Steel mill cargo identification method and device based on two-dimensional code label and computer equipment | |
CN115034286A (en) | Abnormal user identification method and device based on adaptive loss function | |
CN114417405A (en) | Privacy service data analysis method based on artificial intelligence and server | |
CN113723555A (en) | Abnormal data detection method and device, storage medium and terminal | |
CN116383742B (en) | Rule chain setting processing method, system and medium based on feature classification | |
CN115221893B (en) | Quality inspection rule automatic configuration method and device based on rule and semantic analysis | |
CN116560938A (en) | Method, equipment and storage medium for rapidly analyzing logs | |
CN112711577A (en) | Abnormal transaction enterprise identification method and device | |
CN111931186A (en) | Software risk identification method and device | |
CN109918638B (en) | Network data monitoring method | |
CN111460268B (en) | Method and device for determining database query request and computer equipment | |
CN112163217B (en) | Malware variant identification method, device, equipment and computer storage medium | |
CN111027296A (en) | Report generation method and system based on knowledge base | |
CN111831683A (en) | Automatic auditing method and system based on dynamic extended scene matching | |
CN115129927B (en) | Monitoring video stream backtracking method, electronic equipment and storage medium | |
CN109582534B (en) | Method and device for determining operation entry of system and server | |
KR20230150496A (en) | Data pre-processing method and pre-processing device for automating classification of security check items using machine learning model | |
CN108153817B (en) | Intelligent web page data acquisition method | |
CN117893335A (en) | Tax risk identification method and system based on text information extraction | |
Sipayung et al. | Modelling Data Mining Dynamic Code Attributes With Scheme Definition Technique | |
CN116644428A (en) | Webpage risk assessment method, webpage risk assessment device, electronic equipment and storage medium | |
CN115907465A (en) | Reputation risk positioning analysis method and system based on risk positioning model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication |