英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

The aim was to provide the basis for studying on intrusion mechanism and control intrusion of Alternanthera philoxeroides.

[目的]为研究喜旱莲子草的入侵机制及控制其入侵提供依据。

Of them, nineteen alien invasive species belonging to Asteraceae, eight to Poaceae, and seven to Fabaceae and Amaranthaceae respectively, and they take up 56.2% of the total number of the invasive plants in Guangzhou.

结果表明:广州市现有外来入侵植物73种,隶属于27科59属,其中菊科(19种)、禾本科(8种)、豆科(7种)和苋科(7种)植物占了入侵植物总种数的56.2%。

It can also reduce the scope of log records to be analyzed and help to detect anormal log records. Time-line sequence is an important character of log records. Most secure events consist of multi-stages. They will be loged in different network devices or in different system logs. These records have a partial sequence in time and same values in some fileds.

时间上的顺序性是日志记录的重要特征,大多数黑客入侵行为都不是独立的,而是由多个阶段组成的,这在日志系统中的表现就是对于一次入侵行为会在不同的网络设备或不同的系统日志中进行记录,这些记录在时间上存在一个偏序关系,在某些属性域存在相同的值。

The paper presents the improved association analysis algorithm based on FP-Growth, FCM network intrusion detection technologies based on statistical binning, Immunological mix intrusion detection technologies.

论文提出了改进的FP-Growth的关联分析算法、基于分箱统计的FCM网络入侵检测技术和基于免疫学原理的混合入侵检测技术。

The Dwarves' insatiable digging at the Gol'Bolar Quarry unleashed a menacing tribe of Rockjaw Troggs from their subterranean den. While the massing Trogg invasion looms over the lands of King Magni Bronzebeard, the Frostmane Trolls have taken advantage of the distraction to attempt to reclaim their ancestral home.

矮人无节制地挖掘,终于释放了地底的石腭穴居人,而在大批石腭穴居人疯狂入侵矮人国王麦格尼·铜须的国土时,冰巨魔也趁机入侵,妄图夺回他们祖先的地盘。

This paper discusses and identifies the concepts of alien species and alien invasive species;reports 53 species of alien species of plants in Henan Province,including Chenopodium pumilio R.

B r。为中国新记录归化种;分析了河南外来入侵植物的种类构成、来源地、适应性及传播途径;对预防和控制外来入侵植物提出了几点建议

through the existing analysis of network security and intrusion detection technology, this paper puts forward a cooperative intrusion detection method. this new method collects information distributedly, processes in multilateral cooperation, and constructs the large-network ids. then, it collects the information from dialing users to detect whether there are vulnerabilities and virus in individual or not. by means of such functions, this method only permits the users with reliable network repairing system or with the updated latest virus library to access to the campus network.

该文通过对现有校园网络安全及入侵检测技术的分析,提出一种基于协议分析的分布式入侵检测方法,采用分布收集信息,分布处理多方协作的方式,将基于主机的ids和基于网络的ids结合使用,构筑面向大型网络的ids;然后通过全局安全网络协作,收集拨号用户的信息,检查个体计算机是否存在漏洞、病毒,如果发现有就阻止其接入网络,强制其用到可信的网络修复系统或更新最新的病毒库后才可以正常接入校园网。

Invade to examine the system to pass to keep watch on the calculator system or networks in the affairs of the occurrence, and carry on the analysis to them, can discover to invade and threaten to wait the excrescent affairs and as to it's do a reaction.

入侵检测系统通过监视计算机系统或网络中发生的事件,并对它们进行分析,能够发现入侵和威胁等异常事件并且对其做出反应。

Invade to examine the system to pass to keep watch on the calculator system or networks in the affairs of the occurrence, and carry on the analysis to them, can discover to invade and threaten to wait the excrescent affairs and as to it's do a reaction.

求高手帮忙,毕业设计英文摘要翻译,不胜感激。入侵检测系统通过监视计算机系统或网络中发生的事件,并对它们进行分析,能够发现入侵和威胁等异常事件并且对其做出反应。

Flaveria bidentis,a potential exotic invasive weed to agro-ecosystem and rangeland ecosystem,has recently invaded Tianjin City and Hebei Provincein North China,and is spreading further.

菊科黄菊属植物黄顶菊近年出现在我国华北地区天津市和河北省的衡水、廊坊等地,其入侵范围有不断扩大的趋势。黄顶菊是一种入侵性极高的一年生杂草,对农牧业生态系统有极大的破坏性。

第12/100页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。