追踪
- 与 追踪 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The improvement of effectiveness ,active respondent ability and IP traceback ability are analyzed and practiced in this paper.
本文主要对提高入侵检测系统的有效性、对网络攻击事件的主动反应能力以及攻击源追踪能力进行了分析和实践。
-
This system has three functions: misused detection, anomaly detection, and attack source traceback.
该系统实现了误用检测、异常检测、攻击源追踪三个方面的功能。
-
It was originally designed to display extensive traceback information in HTML for CGI scripts.
它原本地设计是为 CGI 脚本显示广泛的追踪信息。
-
The optional argument display defaults to 1 and can be set to 0 to suppress sending the traceback to the browser.
可选参数 display 缺省为1,可以被设置为0禁止发送追踪到浏览器。
-
If given, it is displayed in the traceback that is printed if the exception is never handled.
如果给定,则在异常未被处理时显示于追踪信息之中。
-
Therefore, IP traceback has been the most complex work of the network ecurity.
因此,虚假源 IP 地址数据包的源路径追踪问题成了网络安全中最难解决的问题之一。
-
If the argument logdir is present, the traceback reports are written to files.
如果参数 logdir 是 present ,追踪报告被写入文件中。
-
By this means, distributed traceback system could achieve collaborative tracing and reconstruct attack path.
实验分析表明,该方法提高了追踪信息的有效聚生和攻击源定位的准确性。
-
As a hotspot in IP traceback research field, Probabilistic packet marking is becoming a cause for concern.
概率包标记作为当前IP追踪领域的研究热点日益引起研究者的关注。
-
To make this look better we now want to add the Light Tracer.
要做的更好一点,我们需要添加光线追踪引擎。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。