查询词典 intrusion
- 与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The intrusion ages range from 183.1 Ma to 99.5 Ma(except one of 715.6 Ma), most of them about 150 Ma with isochron age of 132.1 Ma, placing them in early Jurassic to Cretaceous in age.
40Ar/~(36)Ar—40K/~(36)Ar等时线图解给出的等时年龄为132.1Ma,说明这些花岗岩在形成时代上属中侏罗到早白垩世。
-
This thesis study some issues on set up an distributed intrusion detection system based on mobile agent technology.
本文研究了利用移动代理技术实现分布式入侵检测系统的若干问题。
-
No wonder that many of the ISPs judge this intrusion on their turf by the phone and cable companies to constitute unfair competition.
难怪不少的法官商对他们这种入侵的草坪和有线电话公司构成不正当竞争。
-
When this approach is undertaken, the Court examines the extent of the intrusion on the constitutional functions of the other Branch, gauges the extent to which the challenged action aggrandizes in one Branch power that should properly be shared, and balances the competing interests at stake.
在应用这一思路的时候,最高法院考察对其他部门的宪法职能的侵犯程度,研究被质疑的行为在多大的程度上将本应适当共享的权力集中到了一个部门,并且平衡各种相互竞争的利益关系。
-
Particularly, intrusion detection system has been presented to detect attacks that bypassed the prevention methods.
入侵检测系统能够用于检测各种形式的入侵行为,是安全防御体系的一个重要组成部分。
-
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
-
The direction of intrusion detection is the based on network node of it, each node only does the particular detection, and it does deeper intelligent analyzing after centralizing them in the future.
3基于网络节点的入侵检测是今后发展的趋势,每个节点只完成特定的检测,汇集起来后采用智能关联的技术进行分析。
-
Sequence analysis to system call sequences is an important method in intrusion detection,for most of the system intrusions are conduced by illegimate or irregular system calls to operation system.
大多数的入侵行为是由于一系列操作系统内部的非法或异常调用引起的,因此对系统调用序列进行分析是入侵检测的一个重要方法。
-
In a network-based intrusion-detection system, the sensors are located at choke points in the network to be monitored, often in the demilitarized zone or at network borders.
在一个基于网络的入侵检测系统,传感器,分别位于窒息点在网络中加以监测,往往是在非军事区或在网络的边界。
-
Figure 1 shows the model in 1986 by Dorothy Denning made a general model of Intrusion Detection.
图1所示的模型是1986年由Dorothy Denning提出的一个入侵检测通用模型。
- 相关中文对照歌词
- Heat Rising
- Grand Illusion
- Status Seeker
- X-Revolution (Settling For Second Best)
- I Let The Music Speak
- Ride To Agadir
- Ghosts
- Intrusion / Confusion
- You Owe Me One
- Troubled Waters
- 推荐网络例句
-
Listen,point and check your answers.
听,指出并且检查你的答案。
-
Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.
但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48
-
Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.
一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。