入侵
- 与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Along with our country having entered WTO and the world economic quickly inosculating as a whole,our country will faces more and more pressure of the alien pest invading.According to the related international standards and protocols, joining together the invading state of alien pest in our country,we should establish the related alien pest risk method standards and construct an effective risk management measure system to keep the alien pest from invading, it has the important meaning to protect the local agriculture,forestry ,fishing,and environment from destroying,also it has the important meaning to build the stable society.
随着我国加入WTO和全球经济一体化进程的加快,我国面临外来有害生物入侵的风险也越来越大,如何根据相关国际标准和协议,结合我国的国情,研究相关的外来有害生物风险分析方法,建立良好的风险管理措施体系,防止外来有害生物的入侵,保护国内农林渔业生产的安全、生态环境的安全、维护社会稳定构筑和谐社会具有重要的意义。
-
For a long period , being lack of the quantified assessment on the influence of saltwater intrusion , approaches that freshwater is inpoured to the lock chamber are adopted lest the high concentration salt water be imported to the inland waterway , when the navigation lock is in operation .
长期以来,由于缺乏对盐水入侵内河河道产生影响的定量评估,在船闸运行过程中为防止高盐度咸水入侵内河,通常采用将内河淡水打入闸室的方式来调节通航水位,船闸的这种运行方式不尽合理。
-
With the development of network, the hijack intrudes our host more complicated and covertly. As a result, the traditional technology is discouraged to detect these intrusions.
随着计算机网络的发展和普及,网络入侵的手法日益复杂化和隐蔽化,传统的入侵检测方法的缺陷越来越明显。
-
Traditional intrusion detection system is generally used pattern matching technology, but because of its characteristics of the technology itself,it has some shortcomings,such as large amount of computation and low detection efficiency,and detection technology based on protocol analysis do these better compared with pattern matching technology.Its use of agreed rules and the whole conversation in the context of the process of relevance,improveing the speed of intrusion detection system,and reducing the rate of under-reporting and misreporting.
传统的入侵检测系统一般都采用模式匹配技术,但由于技术本身的特点,使其具有计算量大、检测效率低等缺点,而基于协议分析的检测技术较好的解决了这些问题,其运用协议的规则性及整个会话过程的上下文相关性,不仅提高了入侵检测系统的速度,而且减少了漏报和误报率。
-
However, with the appearance of large scale and high speed network, it leads to more and more rampant the actions of hackers, the more secluded intrusive tricks and unpredictable losses which pose a large challenge to the existing IDS.
然而,大规模高速网络的出现、日益猖獗的黑客活动、日新月异的入侵手段、越来越大的破坏性,对传统的入侵监测系统提出了前所未有的挑战。
-
Today computer technology develops at very fast speed, intrusion technology renovates rapidly,IDS technology face great challenge.
现今的计算机技术飞速发展,入侵手段也随着快速翻新,入侵检测系统也面临很大的挑战。
-
Study a network intrusion detection system named Snort, analyses Snorts code.
本文在研究了入侵检测系统的基础之上,分析研究了网络入侵检测系统Snort。
-
The chief points of this paper are summered as follows: Firstly, the dynamic rule-adjusting algorithms in Snort is analyzed. Secondly, some methods to improve the algorithms are discussed and the results of experiment are obtained. Thirdly, a kind of anomaly detection models using association rule mining algorithm is put forward, and the improvements of Apriori algorithm are pointed out. Fourthly, the advantage of the new algorithm and the feasibility of this model are testified. Lastly, a framework of distributed intrusion detection system based on data mining is designed, and distributed cooperation concepts and many detecting methods are adopted in order to guarantee the accuracy and completeness of the detecting system.
论文的主要工作如下:本文分析了Snort中的动态规则调整算法,讨论了一些改进的思路,给出了实验结果;提出了一种运用关联规则挖掘算法进行异常检测的模型,根据入侵检测的实际情况对Apriori算法进行了改进,通过实验证实了改进算法的优越性和模型的可行性;设计了一种基于数据挖掘的分布式入侵检测系统框架,采用分布式协作思想,结合多种检测方法,保证了系统检测的准确性和完备性。
-
Invasion of Iraq today is that one was a complete surprise and one has been completely telegraphed and discussed for months.
在1990年8月伊拉克入侵与今天美国入侵伊拉克的最大不同在於,一个是完完全全的惊讶,而另一个是完整流露且讨论数月。
-
For enhancing the system performance, the simple bit-wise indexing method was applied to the manufacturing defect detection problem, time aspect for manufacturing domains. For improving the flexibility and accuracy, the encapsulated bit-wise indexing method is applied to the pattern matching module of an Internet intrusion detection system. To reduce the processing time, the compacted bit-wise indexing method is applied to the data-driven rough-set based feature selection. Additionally, the proposed feature selection method was adopted in a KA project to discover the desired feature sets to construct a CBR system for a world-wide financial group customer relationship management system's loan promotion function.
而这四个实际系统包含应用在制造过程中由於制程时间的问题所产生的产品缺陷之以遗传演算法之制造缺陷侦测系统、应用在网路入侵侦测系统中的入侵模式的挖掘与比对以提升系统弹性及效率、应用在以资料为导向之约略集合论特徵选取技术并使用於知识撷取系统上以节省执行时间及应用在半导体制造过程中用於缺陷侦测的资料挖掘系统以提升系统效能。
- 推荐网络例句
-
I didn't watch TV last night, because it .
昨晚我没有看电视,因为电视机坏了。
-
Since this year, in a lot of villages of Beijing, TV of elevator liquid crystal was removed.
今年以来,在北京的很多小区里,电梯液晶电视被撤了下来。
-
I'm running my simile to an extreme.
我比喻得过头了。