英语人>网络例句>intrusion 相关的网络例句
intrusion相关的网络例句

查询词典 intrusion

与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]

Firewall and Intrusion Detection System are the important traditional methods to protect network from being intruded.

防火墙和入侵检测系统是传统的维护网络安全的重要手段。

At the same time, this system solved the problem of Data Security Modification, that is to say, users can modify data on the condition of monitoring,and users' action will not be misapprehended as an intrusion.

同时,该系统解决了数据安全修改问题,即在不停止监控的情况下用户可以对数据进行更新,而不会被误解为是入侵行为。

The algorithm is fast and incorporated with intrusion tolerance idea. So it is more propitious to protect the system.

我们的算法不仅速度快,而且结合了入侵容忍的思想,更有利于对系统的保护。

In recently years, the network security is more and more rigorous. Intrusion detection system is one of important components of computer network security defense system.

近些年来,随着网络安全问题的日益严峻,入侵检测系统已成为计算机与网络安全的重要组成部分。

The results show that the two-layer intrusion detection model is more effective and robust.

结果也表明,这种检测模型具有更好的检测效果和健壮性。

A nationwide investigation has also been carried out on species from abroad, and action has been taken to root out the most harmful and noxious of such species in 100 counties in ten provinces, enhancing the public awareness and people's capacity to guard against the intrusion of foreign species.

开展了全国外来入侵物种调查,针对危害较大的主要外来入侵生物开展了&十省百县&灭毒除害行动,提高了公众防止外来入侵生物的意识和能力。

The role acted by Intrusion Detection System in protecting network is becoming more and more vital, from another point of view; it brings a new trouble that IDS especially Distributed IDS would produce masses of alarms, most of which are redundant.

然而,入侵检测系统在保护网络的同时也带来了一个新的问题: IDS会产生大量的报警数据,这些大量的报警数据中的大部分都是重复的、无效的。

The role acted by Intrusion Detection System in protecting network is becoming more and more vital, from another point of view; it brings a new trouble that NIDS would produce masses of alarms, most of which are redundant and unavailable.

然而,入侵检测系统在保护网络的同时也带来了一个新的问题:NIDS(Network-IDS)会产生大量的报警数据,这些大量报警数据中的大部分都是重复无效的。

6 Chapter 10 Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system.

人可利用脆弱性对系统进行罪恶的攻击。人可利用脆弱性对系统进行罪恶的攻击。

They are, however, increasingly threatened by human intrusion and poaching.

但是由于人类的入侵和杀戮,它们受到越来越严重的威胁。

第38/45页 首页 < ... 34 35 36 37 38 39 40 41 42 ... > 尾页
相关中文对照歌词
Heat Rising
Grand Illusion
Status Seeker
X-Revolution (Settling For Second Best)
I Let The Music Speak
Ride To Agadir
Ghosts
Intrusion / Confusion
You Owe Me One
Troubled Waters
推荐网络例句

Listen,point and check your answers.

听,指出并且检查你的答案。

Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.

但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48

Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.

一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。