英语人>网络例句>intrusion tone 相关的网络例句
intrusion tone相关的网络例句

查询词典 intrusion tone

与 intrusion tone 相关的网络例句 [注:此内容来源于网络,仅供参考]

Experiments show its performance on one toy problem and some benchmark datasets. 4. Propose MGEPSVM and SemiMGEPSVM based on attribute reduction, also realize theirs application in intrusion detection.

提出了基于属性约简的MGEPSVM和 SemiMGEPSVM 入侵检测算法,并在KDDCUP99 数据集上进行了实验比较和分析。

On this foundation, the paper proposes an intrusion tolerant database security model based on trapping mechanism.

在此基础上,提出了一种基于诱骗机制的入侵容忍数据库安全模型。

As an important part of the tridimensional security architecture, intrusion detection has become the major researching concern of network security theory nowadays.

入侵检测作为立体纵深防御体系中的重要组成部分,成为当前网络安全理论的研究热点。

In the event of an intrusion, you can use your RPM database like you would use tripwire, but only if you can be sure it too hasn't been modified.

如果发生入侵,您可以使用您的 RPM 数据,比如使用 tripwire,但是要确保它没有被修改。

The Advanced Intrusion Detection Environment is a free replacement for the popular file integrity verification tool Tripwire .

"高级入侵检测环境"是一个自由软件,是流行的文件完整性校验工具Tripwire的替代品。

Intrusion detection systems ; cooperative testing ; trustiness evaluation ; alert correlation analysis

入侵检测系统;合作检测;可信度;警报关联分析

In particular, the intrusion of the Late Yanshannian (102-85Ma) ultrabasic rocks might indicate the re-extensional event of the lithosphere or the re-activation of the deep crustal fractures and are believed to trigger the Carlin type gold mineralization in large scale.

特别是燕山晚期(102~85Ma)超基性岩的贯入,体现了区内岩石圈的再次伸展或基底超岩石圈断裂的复活,对卡林型金矿大规模成矿作用的发生产生重大影响。

The ophiolite hosted in Danzhou Group of Proterozoic Erathem is not broken oceanic crust induced by tectonic intrusion but the result of lensoid type deformation partitioning of early basic and ultrabasic sheet in Longsheng, Guangxi.

广西龙胜地区的蛇绿岩并非是构造侵位于元古界丹洲群中的异地洋壳碎片,而是早期岩浆侵位的基性超基性岩席在原地遭受变形分解作用的透镜体型产物。

Cryptographic protocol is one of the important ways of constructing safe internet environment and protecting the safety of information systems. However, it is very difficult to analyze its limitation and unclose the intrusion.

密码协议是构建网络安全环境、保护信息系统安全的重要手段之一,然而分析其固有缺陷和揭示入侵攻击行为,却是一件非常困难的事情。

Mr. Reed had been dead nine years: it was in this chamber he breathed his last; here he lay in state; hence his coffin was borne by the undertaker's men; and, since that day, a sense of dreary consecration had guarded it from frequent intrusion.

里德先生死去已经九年了,他就是在这间房子里咽气的,他的遗体在这里让人瞻仰,他的棺材由殡葬工人从这里抬走。从此之后,这里便始终弥漫着一种阴森森的祭奠氛围,所以不常有人闯进来。

第46/334页 首页 < ... 42 43 44 45 46 47 48 49 50 ... > 尾页
相关中文对照歌词
Heat Rising
Mellow Tone
"Why Do You Take That Tone With Me?"
LAMC
Mr. Spindel's Phone Call
Caramel Sundae
In A Mellow Tone
City Of Champions
Clear 'Em Out
Grand Illusion
推荐网络例句

You can snipe the second and third union leaders from this position.

您可以鹬第二和第三工会领袖从这一立场出发。

Aiming at the currently shortage of XML streams quality detecting, this paper proposes a new forecasting method of XML streams quality by least squares support vector machines, which is used the method of XML keys' vector matrix as windows, and vector product wavelet transform to multilevel decompose and refactor the XML streams series, that can fulfill real-time checking demand of XML quality, and ensure constraint, consist- ency and integrality. For even more adapting net load, it proposes a control strategy by weight and adaptive adjustment to ensure XML streams quality.

针对当前XML数据流质量检测存在的不足,提出构建XML键的矢量矩阵作为窗口,利用矢量积小波变换多级分解与重构XML数据流,再结合最小二乘支持向量机对XML数据流质量进行预测的一种方法,满足XML数据流质量重构时实时检测的要求,保证XML数据的约束性、一致性与完整性;为了更好的适应网络负载,采取加权与自适应窗口调整等调度策略充分保证XML数据流的质量检测。

This is a very big challenge to developers especially that Ajax is constantly changing.

这对开发者来说是一个非常大的挑战,尤其是需要不断变化的Ajax。