英语人>网络例句>intrusion tone 相关的网络例句
intrusion tone相关的网络例句

查询词典 intrusion tone

与 intrusion tone 相关的网络例句 [注:此内容来源于网络,仅供参考]

For intrusion, only those hypabyssal intrusion rocks with thickness over 15 m, having effective fracture zone, and inserted in or immediately adjacent to mature source rock, and those dikes near contemporaneous fault and within buried hill fracture zone have favorable reservoir forming condition s.

在大量的侵入岩体中,只有侵入岩厚度大于15m,具有有效裂缝带发育、直接嵌置或紧邻成熟烃源岩的浅成侵入岩,以及分布在同生断层附近的、潜山裂缝发育带中的脉岩具备有利成藏条件。

The rock belt are composed of malignite, nepheline gabbro, shonkinite, diopside-sienite, hornblende sienite, amphibole-monzonite,granodiorite-granophyre, kaligranite-porphyry, fraidronite, kersanton, precious garnet, olivine alkali-lamprophyre, alkalic-pyroxenolite, alkalic-basalt, latite and trachyte. And the lithofacies of the potassic rock zone include plutonic intrusion, hypabyssal intrusion and eruption.

本文的研究范围是哀牢山-金沙江钾质碱性岩带,该带位于我国西南三江地区的扬子板块和中缅板块三江褶皱区间的缝合带和多个地体边界带,由喜马拉雅期钾质富碱岩浆岩组成;从北往南由新疆塔什库尔干→沱沱河沿→青海囊谦→西藏江达→云南剑川→下关,向南到金平,中国境内该岩带延长达3700km,且向南延至越南境内,平面上岩带呈反&S&形的线形分布特点。

In order to improve resistive capability of computer and network system,based on Multi-agent,a distributed network intrusion detection model and a distributed network intrusion detection system are presented.

针对当前形势,为了提高计算机及网络系统的防御能力,提出了一种基于多主体的分布式网络入侵检测模型,研究了基于多主体的分布式网络入侵检测系统。

This kind of method not only can identify more intact intrusion process,but also can evaluate the correlation degree of the intrusion process and result of the in- trusion process.

1引宫 目前的入侵检测系统主要注重对单个的入侵事件或异常状态进行检测lJ,当检测到入侵事件或异常状态时,就产生相应的告普信息。

And then,at the foundation of the practice running result, we analyzed and summarized the advantage and weakness of the system based on immunity. On the other hand,through analyzing the existence questions of current intrusion response system,this paper proposes a intrusion response model based on workflows,scheduling problem and J2EE framework. This model filtrates alarm before response, at the same time,it can also predict the coming attacks on-line and make the corresponding response measures .

另一方面,通过分析当前入侵响应系统存在的问题,提出了一种基于工作流和作业调度的J2EE框架构建的入侵响应模型,该模型先对所有报警事件进行过滤然后予以响应,并在响应当前报警事件的同时根据报警信息之间的关系,对进一步可能发生的攻击做出在线的预警并产生相应的响应措施。

Traditional intrusion detection system is generally used pattern matching technology, but because of its characteristics of the technology itself,it has some shortcomings,such as large amount of computation and low detection efficiency,and detection technology based on protocol analysis do these better compared with pattern matching technology.Its use of agreed rules and the whole conversation in the context of the process of relevance,improveing the speed of intrusion detection system,and reducing the rate of under-reporting and misreporting.

传统的入侵检测系统一般都采用模式匹配技术,但由于技术本身的特点,使其具有计算量大、检测效率低等缺点,而基于协议分析的检测技术较好的解决了这些问题,其运用协议的规则性及整个会话过程的上下文相关性,不仅提高了入侵检测系统的速度,而且减少了漏报和误报率。

The adhesion energy and the intrusion energy were analyzed to reveal that the dipping was a lift-off process and the key for successful patterning was the intrusion energy between pentacene, substrate and the D.I. water.

另外,藉由吸附能与侵入能的分析,我们可知此方法为一剥除机制,而介於pentacene薄膜、基板与去离子水间的不同侵入能,便是成功定义出主动区的关键因素。

Nowadays, distributed intrusion detection system research based on the technology of agent and neural network becomes hotspot, software agent technology is considered as a very tool to develop intrusion detection system, especially its characteristic of Autonomy, Social Ability and Adaptability, and neural network technology gains more and more focus in respect that its pre-estimation to unknown network activities.

目前,基于Agent和神经网络技术的分布式入侵检测系统的研究成为业界热点,软件Agent技术因其所具有的良好的自治性、社会性、适应性,被视为在入侵检测系统中极为有用的技术之一,而神经网络技术则因其对未知网络行为的预判性,在入侵检测系统领域得到越来越多的关注。

For each single detection measure or model, there are undetectable intrusion types. To overcome this drawback of single-measure anomaly detector, the two-layer intrusion detection model is provided .

由于每种检测手段都有各自的优缺点,任何一种单独的检测手段或方式都不能够检测出所有的入侵行为。

A distributed intrusion detection system with hierarchical structure and self-security was designed to monitor the running context of the system, and the rules were mined in intrusion detection from MIB according to the essence of network attack.

完成分布式多层次结构化的具有自安全性的入侵检测系统的开发,达到管理代理对网络和主机监听目的。

第8/334页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
相关中文对照歌词
Heat Rising
Mellow Tone
"Why Do You Take That Tone With Me?"
LAMC
Mr. Spindel's Phone Call
Caramel Sundae
In A Mellow Tone
City Of Champions
Clear 'Em Out
Grand Illusion
推荐网络例句

Listen,point and check your answers.

听,指出并且检查你的答案。

Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.

但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48

Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.

一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。