英语人>网络例句>intrusion 相关的网络例句
intrusion相关的网络例句

查询词典 intrusion

与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]

through the existing analysis of network security and intrusion detection technology, this paper puts forward a cooperative intrusion detection method. this new method collects information distributedly, processes in multilateral cooperation, and constructs the large-network ids. then, it collects the information from dialing users to detect whether there are vulnerabilities and virus in individual or not. by means of such functions, this method only permits the users with reliable network repairing system or with the updated latest virus library to access to the campus network.

该文通过对现有校园网络安全及入侵检测技术的分析,提出一种基于协议分析的分布式入侵检测方法,采用分布收集信息,分布处理多方协作的方式,将基于主机的ids和基于网络的ids结合使用,构筑面向大型网络的ids;然后通过全局安全网络协作,收集拨号用户的信息,检查个体计算机是否存在漏洞、病毒,如果发现有就阻止其接入网络,强制其用到可信的网络修复系统或更新最新的病毒库后才可以正常接入校园网。

The study indicates that sea water and brine intrusion processes have different hydrochemical features;and that ion exchange and absorption actions between water and aquifer produce great influence to the intrusion.

研究表明,现代海水、卤水在入侵过程中的地下水水化学特征有明显不同;地下水与含水岩层间的离子交换与离子吸附作用对咸水的地下入侵过程产生重要影响。

The trend of seawater is that the intrusion area varies as following rule: small to big to small to big, and the causation of seawater intrusion is the appropriate hydrodynamic and hydrogeological condition, and the main reason is that human activities change the groundwater hydrodynamical condition.

海水入侵的趋势为:海水入侵面积有小;大→小→大的变化规律:海水入侵的成因是具有了水动力条件和水文地质条件,而人为的改变地下水动力条件是发生海水入侵的主要原因。

For intrusion, only those hypabyssal intrusion rocks with thickness over 15 m, having effective fracture zone, and inserted in or immediately adjacent to mature source rock, and those dikes near contemporaneous fault and within buried hill fracture zone have favorable reservoir forming condition s.

在大量的侵入岩体中,只有侵入岩厚度大于15m,具有有效裂缝带发育、直接嵌置或紧邻成熟烃源岩的浅成侵入岩,以及分布在同生断层附近的、潜山裂缝发育带中的脉岩具备有利成藏条件。

The rock belt are composed of malignite, nepheline gabbro, shonkinite, diopside-sienite, hornblende sienite, amphibole-monzonite,granodiorite-granophyre, kaligranite-porphyry, fraidronite, kersanton, precious garnet, olivine alkali-lamprophyre, alkalic-pyroxenolite, alkalic-basalt, latite and trachyte. And the lithofacies of the potassic rock zone include plutonic intrusion, hypabyssal intrusion and eruption.

本文的研究范围是哀牢山-金沙江钾质碱性岩带,该带位于我国西南三江地区的扬子板块和中缅板块三江褶皱区间的缝合带和多个地体边界带,由喜马拉雅期钾质富碱岩浆岩组成;从北往南由新疆塔什库尔干→沱沱河沿→青海囊谦→西藏江达→云南剑川→下关,向南到金平,中国境内该岩带延长达3700km,且向南延至越南境内,平面上岩带呈反&S&形的线形分布特点。

In order to improve resistive capability of computer and network system,based on Multi-agent,a distributed network intrusion detection model and a distributed network intrusion detection system are presented.

针对当前形势,为了提高计算机及网络系统的防御能力,提出了一种基于多主体的分布式网络入侵检测模型,研究了基于多主体的分布式网络入侵检测系统。

This kind of method not only can identify more intact intrusion process,but also can evaluate the correlation degree of the intrusion process and result of the in- trusion process.

1引宫 目前的入侵检测系统主要注重对单个的入侵事件或异常状态进行检测lJ,当检测到入侵事件或异常状态时,就产生相应的告普信息。

And then,at the foundation of the practice running result, we analyzed and summarized the advantage and weakness of the system based on immunity. On the other hand,through analyzing the existence questions of current intrusion response system,this paper proposes a intrusion response model based on workflows,scheduling problem and J2EE framework. This model filtrates alarm before response, at the same time,it can also predict the coming attacks on-line and make the corresponding response measures .

另一方面,通过分析当前入侵响应系统存在的问题,提出了一种基于工作流和作业调度的J2EE框架构建的入侵响应模型,该模型先对所有报警事件进行过滤然后予以响应,并在响应当前报警事件的同时根据报警信息之间的关系,对进一步可能发生的攻击做出在线的预警并产生相应的响应措施。

Traditional intrusion detection system is generally used pattern matching technology, but because of its characteristics of the technology itself,it has some shortcomings,such as large amount of computation and low detection efficiency,and detection technology based on protocol analysis do these better compared with pattern matching technology.Its use of agreed rules and the whole conversation in the context of the process of relevance,improveing the speed of intrusion detection system,and reducing the rate of under-reporting and misreporting.

传统的入侵检测系统一般都采用模式匹配技术,但由于技术本身的特点,使其具有计算量大、检测效率低等缺点,而基于协议分析的检测技术较好的解决了这些问题,其运用协议的规则性及整个会话过程的上下文相关性,不仅提高了入侵检测系统的速度,而且减少了漏报和误报率。

The adhesion energy and the intrusion energy were analyzed to reveal that the dipping was a lift-off process and the key for successful patterning was the intrusion energy between pentacene, substrate and the D.I. water.

另外,藉由吸附能与侵入能的分析,我们可知此方法为一剥除机制,而介於pentacene薄膜、基板与去离子水间的不同侵入能,便是成功定义出主动区的关键因素。

第6/45页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
相关中文对照歌词
Intrusion / Confusion
推荐网络例句

In the United States, chronic alcoholism and hepatitis C are the most common ones.

在美国,慢性酒精中毒,肝炎是最常见的。

If you have any questions, you can contact me anytime.

如果有任何问题,你可以随时联系我。

Very pretty, but the airport looks more fascinating The other party wisecracked.

很漂亮,不过停机坪更迷人。那人俏皮地答道。