A correlation analysis method and system for mail information and malicious code information
A correlation analysis and malicious code technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as difficult security situation, difficult to unify the relationship between information, no correlation analysis between email information and malicious code information, etc., to achieve Facilitate in-depth mining and analysis of the effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0060] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.
[0061] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.
[0062] In order to solve the above-mentioned problems, the present invention now proposes a correla...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


