入侵
- 与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The higher demands are made on the intrusion detection technology with the increasingly noticeable problem of the network security, but the existing intrusion detection has some limitations facing with the fast change of attack technology. Then on the basis of analyzing some representative IDS the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity,flexibility,interoperablility.
网络安全问题的日益突出对入侵检测技术提出了更高的要求,然而现有入侵检测技术面对攻击技术的飞速变化仍然存在一定缺陷,入侵检测系统在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。
-
Although the unique independence, mobility of Mobile Agent can improve the haleness, tolerableness, adaptability and expansi- bility of the intrusion detection system, which induce Mobile Agent has used for intrusion detection system, it is necessary to improve on the intrusion detection system which base on Mobile Agent for questions faced the intrusion detection system.
虽然移动Agent独特的自主性和移动性可以提高入侵检测系统的健壮性和容错性,增强适应性和可扩展性,使得移动Agent技术目前已经用于入侵检测系统,但是考虑目前入侵检测所面临的问题,有必要对基于移动Agent的入侵检测系统改进。
-
The tongue-like LSW intrudes northeastward and southwestward respectively from NJS and CS. The former is wide and strong, while the latter is relatively weak.
苏北浅滩入侵低盐水舌向北偏东方向延伸,水舌较宽,入侵较远;石岛附近入侵低盐水舌向南偏西方向延伸,水舌较窄,入侵较弱。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
Since the , most literature on predicting weediness or invasiveness of plants has focused on the characteristics of the plant , or on the invaded environment .
20世纪90年代以来,关于植物入侵争论的焦点集中于入侵植物本身的生物学特点或入侵生境特点,然而,争议多于结论,至今未能找出有效预测外来植物入侵性的答案。
-
Since the 1990s , most literature on predicting weediness or invasiveness of plants has focused on the characteristics of the plant , or on the invaded environment .
20世纪90年代以来,关于植物入侵争论的焦点集中于入侵植物本身的生物学特点或入侵生境特点,然而,争议多于结论,至今未能找出有效预测外来植物入侵性的答案。
-
DNA C-values might be one of important indices in the evaluation of angiospermous invasiveness. To test this viewpoint, we compared DNA 1C-values and basic genome sizes in 3,676 angiosperms. The results suggest that:(1) the two nuclear values vary greatly among different groups, e.g., significantly higher in herbs than in trees, in monocots than in dicots, in perennials than in non-perennials;(2) the two nuclear values both have significant effects on plant invasiveness, especially in herbs, dicots, monocots, perennials, non-perennials, diploids, polyploids, Compositae, and Poaceae, while not significant in trees and Fabaceae.
DNA C值与被子植物入侵性密切相关,为考察应用DNA C值评估被子植物入侵性的可靠性和局限性,我们统计分析了全世界范围内3676种被子植物的DNA 1C值(配子未发生DNA复制时的染色体DNA含量)及基因组大小(单个染色体组的DNA 含量),结果表明:1)DNA 1C值和基因组大小在被子植物不同类群中差异极大,例如在草本植物中显著高于木本植物,单子叶植物显著高于双子叶植物,多年生植物显著高于非多年生植物;2)两项指标都与被子植物入侵性显著负相关,尤其是在草本植物、双子叶植物、单子叶植物、多年生植物、非多年生植物、二倍体、多倍体、菊科和禾本科中,然而在木本植物、豆科植物中其与植物入侵性无显著关系。
-
The trend of seawater is that the intrusion area varies as following rule: small to big to small to big, and the causation of seawater intrusion is the appropriate hydrodynamic and hydrogeological condition, and the main reason is that human activities change the groundwater hydrodynamical condition.
海水入侵的趋势为:海水入侵面积有小;大→小→大的变化规律:海水入侵的成因是具有了水动力条件和水文地质条件,而人为的改变地下水动力条件是发生海水入侵的主要原因。
-
Firstly, this thesis introduces background, concept and characteristics of MANET, and points out security issues and challenge through a security requirement analysis for MANET. Secondly introduces the basic concept, classified methods and the composing of the IDS.Basing on the research of the lineate networks, this thesis proposes a hiberarchy model based zone, and presents a new
在针对有线网络入侵检测技术研究基础上提出了适用于无线Ad Hoc网络的基于域多层入侵检测模型,并在该模型基础上实施一种新的混合入侵检测算法;通过NS-2网络模拟仿真器模拟测试了该算法的可行性与有效性,构建了移动Ad Hoc网络与有线网络的互连模型,并提出了适用于该互连模型中的入侵检测实施方案。
-
Based on the Common Intrusion Prevention Framework and the NetworkBased Intrusion Prevention System standards, we present an intrusion prevention system called Gigabits IPS, which is used to improve the prevention speed and accuracy, and to ensure highspeed network monitoring. The GIPS consists of the data capture module, the event generation engine, the policy script interpreter and the intrusion prevention module.
文着眼于提高入侵防御系统[1]的检测速度和精准度[2],遵循通用入侵检测框架[3]规范,依据基于网络的入侵检测系统的结构要求,依据层次化结构设计的思想,自底向上依次分为数据采集模块、事件生成引擎、策略脚本解释器和入侵防御模块四个部分。
- 推荐网络例句
-
The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.
采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。
-
By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.
通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。
-
Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.
有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。