1. Ἲ ( Integrity monitoring )
Ἲ̶ ýۿ ̻ Ͽ ̰ ð ڿ 溸 ִ ɷ ǹѴ. Ἲ ý ۵ ؼ ũ ̻ Ͽµ Ἲ Ͽٰ Ѵ. ġ ġ ̰ Ŭ Ƿ ſ Ȳ ó ְ ȴ.
Ἲ оߴ Anomaly detection Error estimation, ̷ о߷ . Anomaly Detection κп ȣ ԵǾ ִ ϰ ִٸ ȣ ԵǾִ ã Ѵ. ̷ ؼ ŵǰ ġ ȴٰ ϴ ȣ ԵǾ Ƿ Ȯ ġϴ ġ . Error Estimation κп ̷ ذ ȣ ذ ġ Ͽ ġ ġ 踦 Ͽ ġ ġ Ƶ鿩 Ǵϰ ȴ.
2. Anomaly detection
Anomaly detection ġ ̿Ͽ ġκ Ųٷ Ÿ Ͽ ġ ŵ ġ ũ⸦ ϴ Ѵ. ֵ ¿ ġ ġ ġ ġ 쿡 ġ ġ ū ̸ ̱ ġ ġ ū ̸ ̰ ȴ. ̶ ̰ Ͽٰ Ǵؾ ϴ ʿѵ Ͼ ʾҴµ Ͼٰ Ǵ Ȯ 10-5 ϰ ǵ ذ Ѵ.
Figure 1. Anomaly detection
3. Error detection
ڴ ŵ ȣκ ڽ ġ ġ ġ ִ . ̸ ذϱ ȣ noise ذ ġκ ڽ ġ ġκ mȿ ԵǴ Ѵ. ̶ ȣ(Protection level)̶ ϰ ڴ ڽ ġ ȣ ȿ ִٰ ϰ θ ϰ ȴ. ȣ 䱸Ǻ ũ Ǵ 쿡 ڽ ġ Ƿ Ұϴ. ȣ ִ ۰ ɼ ̷ ϱ ؼ ġ Ȯ Ͽ Ѵ.
Figure 2. Error detection
|