查询词典 intrusion tone
- 与 intrusion tone 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.
本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。
-
The necessity and its intrusiveness of bodily intrusion search make it necessary to impose a serial of restraints on the issuance and execution of the bodily intrusion search.
侵入身体采证的必要性以及其本身所具有的侵犯性,决定了侵入性身体采证的启动以及实施要受到一系列的限制。
-
Therefore, some these fields are thoroughly investigated in this dissertation, which are respectively mentioned as the following: 1. The Formal Description Language ISITL for Intrusion Signatures ISITL is a high-abstractive formal description language for representing intrusion signatures based on the interval temporal logic and first-order predicate calculus.
本论文对此展开了全面深入的研究,其内容主要包括: 1、基于时段时态逻辑和一阶谓词逻辑的入侵特征形式化描述语言ISITL ISITL克服了以往检测语言以"情景描述"为主的缺陷,转而采用形式化的方法来刻画入侵模式的入侵特征。
-
The Snort is a typical Net Intrusion Detection System, and some of design principle and characteristics of which is the base of most popular mercantile Intrusion Detection System.
Snort系统是一个典型的网络入侵检测系统,其若干设计原理和实现特点,是目前多数商用入侵检测系统的研发基石。
-
This paper works over intrusion detection system, and study a network intrusion detection system nam...
通过实验比较了各算法的时空性能,证实了改进的算法在时间性能上的优势。
-
Generally, the traditional Intrusion Detection Techniques can be categorized into anomaly detection or misuse detection. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. In this technique, a Markov chain model is used to represent a temporal profile of normal behavior of a process. The Markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on UNIX system.
传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。
-
This thesis analyze normal process of intrusion detection technology and make some analyses on classification of intrusion detection technology.
本文在此方面做了一些工作,提出了一个基于代理的协作化层次型入侵检测模型。
-
Intrusion detection system can detect the resource of the system and network in real time, find intruder, and prevent the legal users mistake operation on the resources. Intrusion detection system has expanded the concept of security protection and remedied deficiency of traditional security tactics.
入侵检测系统可以对系统或者网络资源进行实时检测,及时发现系统或网络的入侵者,也可以预防合法用户对资源的误操作;入侵检测系统扩充了安全防护的概念,弥补了传统安全策略的不足。
-
The framework model proposed in this paper is a real time intrusion detection sy stem based on Agent, which provides an interface for intrusion detection com pone nts.
提出了一个基于 Agent的分布式入侵检测系统模型框架。
-
Ve Bayesian. The thesis researches and designs the inference rule of anomaly intrusion detection system based on Bayesian Network, the learning rule of feature parameters used by anomaly intrusion system based on Bayesian network, and designs data structure of Bayesian Network and the relevant algorithms.
研究并设计了入侵推理和基于贝叶斯网络异常检测特征参数的学习规则、设计了贝叶斯网络的数据结构及相关算法。
- 相关中文对照歌词
- Heat Rising
- Mellow Tone
- "Why Do You Take That Tone With Me?"
- LAMC
- Mr. Spindel's Phone Call
- Caramel Sundae
- In A Mellow Tone
- City Of Champions
- Clear 'Em Out
- Grand Illusion
- 推荐网络例句
-
Listen,point and check your answers.
听,指出并且检查你的答案。
-
Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.
但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48
-
Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.
一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。