英语人>网络例句>intrusion 相关的网络例句
intrusion相关的网络例句

查询词典 intrusion

与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper proposes one kind of network intrusion and abnormal detection models on the basis of a network supporting vector machine,which can inspect network intrusion and abnormal detection with the class II categorized ability of support vector machine.

网络安全的主要威胁是通过网络对信息系统的入侵,它是指任何破坏计算机或网络完整性、保密性、可用性的行为。

Based on information-theory, a lower bound on the size of the detector set is derived. Detector Generating algorithm is described. The performance of Artificial Immune Intrusion Detection System is better than the normal intrusion detection system based on knowledge engineering.

免疫原理在入侵检测领域的应用是一个刚刚兴起的研究,它的目的是使检测系统具有分布性、多样性、自适应性、自动应答和自我修复的特点,具有检测异常现象、利用不完备信息进行检测的能力,这是原有系统达不到的。

The design and implement of intrusion detecting engine in intrusion detection system is the core part of this paper .

入侵检测系统中的入侵检测引擎的设计和实现是本文的核心部分。

With the development of computer network, problems of network security have become increasingly prominent, and network intrusion has become more and more serious. Currently, there are no effective means for locating and confirming the intrusion events that have happened, and it is difficult to block network attacks and form powerful determent for network attacker.

随着计算机网络的发展,网络安全问题变得日益突出,网络入侵现象也越来越严重,而目前缺乏有效的手段对入侵行为进行定位以及事后取证,因此很难有效遏制网络攻击,并形成对网络攻击者的强有力的威慑。

The ways of intrusion are karst fissure, structural fracture and the intrusion in contact-zone of diabase and rock.

海水入侵的途径有裂隙岩溶、构造断裂及辉绿岩体与基岩的接触带入侵。

The higher demands are made on the intrusion detection technology with the increasingly noticeable problem of the network security, but the existing intrusion detection has some limitations facing with the fast change of attack technology. Then on the basis of analyzing some representative IDS the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity,flexibility,interoperablility.

网络安全问题的日益突出对入侵检测技术提出了更高的要求,然而现有入侵检测技术面对攻击技术的飞速变化仍然存在一定缺陷,入侵检测系统在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。

At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.

论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。

During the study procedure of intelligent intrusion-detection model and network security forecast technology, as a result of analyzing the hacker intrusion technology and user network behavior feature, this paper gives out a categorizing principle and proposes a model of user network behaviors habit, and then implemented them in the security forecast subsystem of FireGuard firewall to detect the network intrusion effectively.

在对基于知识推理的智能网络入侵检测模型和网络安全预警方法的研究过程中,通过对网络黑客攻击方式和手段以及Internet上用户网络行为特征的分析,给出了用户违反网络安全规则行为的分类原则,在此基础上,提出了基于数理统计思想的用户网络行为习惯模型,并在FireGuard代理防火墙系统的智能安全预警子系统中进行了实现。

As the most of traditional Intrusion Detection Systems are static and have difficulty in coordinating with the outer dynamic situation, consequently, leading to a serial of deficiency such as limited distribution .limited accommodation and limited robust etc. Fortunately, the Human Immune System can protect themselves from the invasion of the virus, germina and all such sort of things. Meanwhile, they has a lot of excellent features such as good distribution, Self-organization,dynamic and so on and these features perform fabulous similarity on the function and characteristic with the Intrusion Detection System,which arousing peoples highly attention and interesting and make the researching and development of the Intrusion Detection System based Human Immune System becoming one of the hot and the key of the network security research.

由于传统的入侵检测系统大多是静态的,很难与动态环境协调一致,造成分布性差,适应性差,健壮性不好等种种缺陷;而生物免疫系统可以保护人类机体不受诸如病毒,病菌等各种病原体的侵害,且表现出了分布式保护,多样性,自组织性,动态性等良好特性,且这种与入侵检测系统在功能和特性上的惊人相似,引起人们的高度重视和兴趣,使得借鉴生物免疫系统的机理开发研究入侵检测系统成为网络安全的研究热点和重点。

On the basis of retrospecting the development of intrusion detection technology, the problems incurrent intrusion detection systems are analysised. By comparing several kinds of intelligent methods in intrusion detection including artifical neural network, artifical immunity and data mining, we present that data mining is a perfect method to construct normal profile of protected system which is used in anomaly detection.

入侵检测作为一种主动防御手段,在其发展的过程中,有些问题一直没有得到很好的解决,如对未知攻击的识别与界定以及受保护系统正常模式的建立等,目前国内外普遍采用在异常检测中引入智能化方法来解决这些问题,例如采用神经网络、人工免疫、数据挖掘技术等等,其中数据挖掘是目前比较理想的一种方法。

第3/45页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Intrusion / Confusion
推荐网络例句

Objective: To study the effect of polycythemia on blood oxygen saturation.

裴蕾目的:观察RBC剧增而引起的高粘血症对血氧饱和度的影响。

Based on SIMPLER algorithm in the curvilinear body-fitted coordinates, the calculations were performed for Pr=0.7, Re=10~1000 on non-orthogonal non-staggered grids which are generated by elliptic equation systems.

采用曲线坐标系下压力与速度耦合的SIMPLER算法,数值研究了周期性渐扩渐缩波纹通道内脉动流动与换热情况,流动Re数的范围为10~1000,Pr数为0.7。

Such a traditional division of the zone of aeration is useful for illustrative purposes.

为了说明的目的,包气带的传统划分是有用的。