网站首页  词典首页

请输入您要查询的英文单词:

 

单词 intrusion-detection
释义

intrusion-detection

  • 网络入侵检测;入侵侦测;入侵探测
1.
入侵检测
入侵检测入侵检测Intrusion Detection)是对入侵行为的检测。它通过收集和分析网络行为、安全日志、审计数据、其它网络 …
wenwen.soso.com
2.
入侵侦测
入侵侦测(intrusion detection) 的定义是监视一个系统或网路发生的事 ... 入侵防御( intrusion prevention) 是指除了进行入侵侦测 …
www.docin.com
3.
入侵探测
审计跟踪_百度百科 ... 事件重建( reconstruction of events) 入侵探测intrusion detection) 故障分析( problem analysis) ...
baike.baidu.com
4.
入侵检测技术
入侵检测技术Intrusion Detection)的定义为:识别针对计算机或网络资源的恶意企图和行为,并对此做出反应的过程。IDS …
www.lwfree.cn
5.
入侵侦防系统
防火墙(Firewall) 、入侵侦防系统 (Intrusion Detection) ? 提供网路安全,便不能不谈到防火墙及侦防系 统,尤其在VPN 的网路 …
www.docin.com
6.
侵入检测
IT术语表 Glossary of Terms... ... Integrated 集成 Intrusion Detection 侵入检测 Intrusion Detection System 侵入检测系统 ...
www.fanyicn.net
7.
实时入侵监测
15、实时入侵监测Intrusion Detection ) 16、集中在线监控管理(Aggregate Control )三、应用示例 除了常用的堡垒主机、 …
www.soft6.com

例句

释义:
1.
Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可变通常是安全或者入侵检测工作的一部分。
www.ibm.com
2.
As As an active security defense technology, intrusion detection makes up for the weaknesses of traditional security technology.
摘要入侵检测技术是一种主动防御安全技术,可以弥补传统安全技术的不足。
search.gucas.ac.cn
3.
The intent of good developer-oriented intrusion detection is to get the maximum benefit with the least amount of time.
出色的面向开发人员的入侵检测旨在通过最少的时间获得最大的收益。
www.ibm.com
4.
The same analysis showed that an investment in Intrusion Detection did not reduce enough losses to justify its cost.
同样的分析表明在侵入窃密检测上的投资不会减少足够的损失以调整成本。
www.ibm.com
5.
Forrest. The simulation results show that this method has better intrusion detection rates.
实验仿真说明,这种方法可以有效的提高入侵检测率。
www.ceps.com.tw
6.
The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).
这个步骤的目标是以一种特殊方式格式化有效负载,以便它能躲避壁垒森严的入侵探测系统(IDSs)。
www.ibm.com
7.
An analytical math model was established basing on three form and decline of biological memory and was used in intrusion detection system.
以生物记忆的三种形式的形成与衰减为基础建立一种数学分析模型,并将此应用到入侵检测中去。
www.dictall.com
8.
This paper discusses the traditional algorithm of na? ve bayes in intrusion detection and points out the shortcomings of it.
讨论了传统的朴素贝叶斯算法在入侵检测中的应用,指出了其存在的问题;
kns50.chkd.cnki.net
9.
The intrusion detection system as one of the key technology while auditing safely , is the important component of network safe protection.
入侵检测技术作为安全审计中的核心技术之一,是网络安全防护的重要组成部分。
dictsearch.appspot.com
10.
Thus, many illegal connections do not use the standard port or use the tunnel technology to evade the intrusion detection system's testing.
正是因为这样的原理,很多非法的连接不使用标准端口或者采用隧道技术躲避入侵检测系统的检测。
www.ceps.com.tw
1.
Intrusion Detection is an important security technology of protecting information system as well as firewall and data encryption techniques.
入侵检测是继数据加密、防火墙等传统安全保护技术后的又一种新的安全技术。
www.fabiao.net
2.
If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.
如果一个实际的入侵检测系统不对数据进行处理,则无法准确地检测到入侵行为。
kns50.chkd.cnki.net
3.
The performance of a signature-matching-based network intrusion detection system (NIDS) is dominated by pattern matching algorithm.
基于特征匹配的网络入侵检测系统的性能主要受模式匹配算法的影响。
www.magsci.org
4.
Intrusion detection and prevention is enabled with an annually licensed IPS engine with Juniper Deep Inspection Firewall signature packs.
入侵侦测和保护,是通过每年授权一次的IPS引擎和Juniper深度检测防火墙(JuniperDeepInspectionFirewall)签名包提供的。
www.bing.com
5.
Model improves the efficiency of network intrusion detection system with a higher detection rate and low false negative rate by experiment.
通过实验证明,该模型提高了网络入侵检测系统的效率、有着较高的检测率和较低的漏报率。
www.fabiao.net
6.
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities.
入侵检测系统依赖于大量的数据检测以区别合法和非法的行为。
www.ceps.com.tw
7.
Development direction of intrusion detection technology is brought forward after the attack technology is discussed.
并结合当今攻击技术的发展,提出今后入侵检测技术的发展方向。
kns50.chkd.cnki.net
8.
Because of the scalability of finite automaton, the intrusion detection system was made to be of certain anomaly detection capabilities.
由于解析自动机的可扩展性,使其具备一定的异常检测能力。
www.ceps.com.tw
9.
This mechanism has a perfect scalability and is well fitted to the characteristic of large-scale distributed intrusion detection systems.
文中提出的数据融合机制具有很好的扩展性,非常适合大规模分布式网络环境的特点。
www.magsci.org
10.
Intrusion detection system (IDS) is an active security technology which can prevent the network resources from being attacked by hackers.
入侵检测系统是一种主动保护网络资源免受黑客攻击的安全技术。
www.ceps.com.tw
1.
Then there are a number of intrusion detection systems (IDS) like the very popular Snort and logsnorter.
还有很多入侵检测系统(IDS),例如非常流行的Snort和logsnorter。
www.ibm.com
2.
It's an intrusion detection system -- not just a tool.
它是一种入侵检测系统——而不仅仅是工具。
www.ibm.com
3.
Intrusion detection system as a reasonable complement of Firewall can detect real-time computer and network intrusion events.
入侵检测系统作为防火墙的合理补充,能够实时地检测出计算机和网络中出现的入侵活动。
www.fabiao.net
4.
Information security of the C3I system includes communication security, information authentication, intrusion detection and virus defence.
指挥控制系统的信息安全包括保密通信、信息认证、入侵检测和病毒防范。
www.gongkong.com
5.
Intrusion detection systems are one of the important ways to protect the security of wireless local area networks(WLANS).
入侵检测系统对于保障无线局域网(WLAN)的安全十分重要。
stae.com.cn
6.
An intrusion detection system with multi detection engines could overcome the limitations of one with a single detection engine.
具有多检测引擎的入侵检测系统能够克服单一检测技术的检测局限性。
www.juyy.net
7.
Ie. An intrusion detection system may need to trap every packet on the network and feed it into a system.
例如,入侵检测系统需要捕捉网络上的每个包,并把它输入到系统中。
kahonteam.blogcn.com
8.
Intrusion detection belongs to the category of classification and pattern recognization in a broad sense.
入侵检测过程广义上属于分类和模式识别的范畴。
www.jukuu.com
9.
It's Security Agents for Network Traffic Analysis uses mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
www.examw.com
10.
A hybrid intrusion detection model is presented against the high false positive and false negative rate in Intrusion Detection System (IDS).
针对入侵检测系统的高漏报率及高误报率问题,提出一种混杂入侵检测模型。
www.ecice06.com
1.
The paper proposed the application of a data mining algorithm in intrusion detection system.
文章讲述了一种基于关联规则的数据挖掘算法在入侵检测系统中的应用。
www.ceps.com.tw
2.
The network security, this paper dielectric from the firewall, attack and emergency response, intrusion detection, several simple hackers.
介此网络安全,本文从防火墙、攻击与应急响应、入侵检测、黑客等几点进行简单的探讨。
wenda.tianya.cn
3.
The dissertation mainly aims at applying support vector machine (SVM) and kernel principal component analysis (KPCA) to intrusion detection.
本文的主要工作是将支持向量机(SVM)及核主成分分析(KPCA)应用到入侵检测技术中。
www.fabiao.net
4.
Intrusion detection - Alarm control and indicating equipment - Requirements.
侵入检测。报警控制和指示设备。要求。
www.stdbook.org
5.
This thesis describes the design and implementation of a Network-based Intrusion Detection System, NetShield.
本文描述了一个基于网络的入侵检测系统-NetShield的设计与实现。
www.juhe8.com
6.
Absrtact: Invasion eigenvalue and discovery algorithm are the key technologies to misuse intrusion detection technology.
摘要:入侵特征值识别和发现算法是误用入侵检测中的关键技术。
www.xactad.org
7.
In applications of intrusion detection and stateful filtering, conflict discovery and resolution are key issues affecting security and QoS.
在入侵检测系统和状态检测防火墙等应用中,规则冲突检测及冲突解析算法是影响安全性及服务质量的关键。
dictsearch.appspot.com
8.
Finally, a distributed model of intelligent intrusion detection based on the human immune system is raised, and its working process is . . .
提出了一种基于人体免疫原理的分布式智能入侵检测系统模型和描述了其工作流程。
epub.cnki.net
9.
Intrusion Detection Technology and Its Importance in the Network of Colleges and Universities.
入侵检测技术及其在高校网络中的重要性。
sznq.com
10.
The experimental results prove that the method can create the valid decision tree for the intrusion detection system.
实验证明,该方法可为入侵检测系统生成有效的决策树。
www.ceps.com.tw
1.
INTRUSION DETECTION. ULTRASOUND MOTION DETECTORS. SPECIFIC STANDARD.
侵入的检测.超声波的运转检测器.特殊标准
www.mapeng.net
2.
For a good collection of papers on topics ranging from securing a Web server to intrusion detection.
在那里可找到他们收藏的许多优秀的论文,其主题范围很广,从保护Web服务器到入侵侦测,都在其内。
www-128.ibm.com
3.
Intrusion detection is a new technology which developed with the network technology and information security technology.
入侵检测技术是随着网络技术和信息安全技术的发展而诞生、发展的;
kns50.chkd.cnki.net
4.
Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
www.joca.cn
5.
Some useful results on software fault-tolerant, software test techniques, and network intrusion detection are also presented.
项目研究还在软件容错理论、软件测试技术和网络入侵检测等方面得到了一系列有意义的结论。
www.pet2008.cn
6.
INTRUSION DETECTION. OPENING DETECTORS, CONTACT. SPECIFIC STANDARD.
侵入的检测.开口式接触检测器.特殊标准
www.mapeng.net
7.
For this kind of intelligent intrusion detection system, the training dataset is important to the performance of the IDS.
针对这种基于人工智能的入侵检测系统,本文提出应用序列互相关特性选择训练数据的方法。
www.ceps.com.tw
8.
As an active technology of security, intrusion detection is the focus of lots of recent researches.
入侵检测作为一种积极主动的安全防护技术,对它的研究倍受重视。
www.fabiao.net
9.
Intrusion detection as a proactive security protection technology has become a part of the future network security study.
入侵检测技术作为一种主动的安全防护技术,成为未来网络安全研究中不可缺少的一部分。
www.fabiao.net
10.
Intrusion detection and prevention, at both the host and network layer, are staples of information security infrastructure today.
同时在主机和网络层面进行入侵监测和预防,这是当今信息安全基础设施建设的主要内容。
shi-wei.net
1.
Main work include: The article analyzed currently intrusion detection technique the weakness of haleness, study and ability. etc.
本文的主要工作包括:文章分析了目前的入侵检测技术存在适应性、健壮性、学习能力差等缺点。
www.fabiao.net
2.
INTRUSION DETECTION. ALARM SYSTEMS. ALARM SYSTEMS USING WIRE-FREE OR NON SPECIFIC WIRED LINKS. SPECIFIC STANDARD FOR HERTZIAN LINKS.
侵入的检测.报警系统.无线或有线联络系统.电磁波联络用的专业标准
www.mapeng.net
3.
Taking the example of designing classifier in intrusion detection system, the selection of training samples for classifier is studied.
以入侵检测系统中的分类器设计为例,研究分类器训练样本选择问题。
www.ceps.com.tw
4.
Intrusion detection - Very-high frequency motion detectors - Specific standard.
侵入检测。甚高频运转检测器。专用标准。
www.stdbook.org
5.
A dedicated intrusion detection and removal Trojan horse on your system the professional program, built 3093 Trojan logo.
一个专门检测和清除侵入您系统中的特洛伊木马的专业程序,内置3093个木马标识。
www.jisuxz.com
6.
Therefore, research on collaboration between honeypot and intrusion detection systems is a problem worthy of study.
因此,蜜罐与入侵检测系统之间的协作是一个非常值得研究的问题。
www.fabiao.net
7.
Pattern matching algorithm is an important algorithm, used by most of Intrusion Detection System.
模式匹配算法是入侵检测系统中使用较多的一种重要算法。
ceaj.org
8.
The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.
作者很快得出了两个重要的主题:入侵检测系统,IDS,和旁路过滤。
www.ibm.com
9.
Network-based intrusion detection system (NIDS) detects attacks by capturing and analyzing network packets.
网络入侵检测系统(NIDS)通过捕获和分析网络数据包判断是否存在攻击行为。
www.ceps.com.tw
10.
It is mostly used in the function optimization, engineering control and intrusion detection.
人工免疫系统现在更多的是被用于函数优化、工程控制及入侵检测方面。
www.fabiao.net
1.
Install multiple intrusion-detection systems and multiple routers for incoming traffic to reduce choke points.
在安装多个入侵侦测系统和多重路由器来袭交通,以减少呛点。
blog.sina.com.cn
2.
Actually, the difficult of intrusion detection focuses on detection efficiency, fault alert and failure alert.
实际中入侵检测的难点主要在于检测的效率问题,误报和漏报的问题。
www.fabiao.net
3.
Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS.
用于网络入侵检测系统(IDS)的特征(变量)数量太多或太少都会降低IDS识别入侵者的正确率。
kns50.chkd.cnki.net
4.
The capability of intrusion detection system is affected directly by match rules and precision of match probability.
匹配规则和匹配概率精度直接影响入侵检测系统的性能。
www.dictall.com
5.
This article provides an analysis of the genetic algorithm in network intrusion detection.
本文主要分析了遗传算法在网络入侵检测中的应用。
m.qikan.com.cn
6.
The content of this article is base on the artificial immune model of intrusion detection.
本文研究的内容是包含在基于人工免疫系统的入侵检测框架中的。
www.lw23.com
7.
Intrusion detection technology also is an address hotspot at recently.
入侵检测技术研究也是近年来信息安全研究领域的一个热点。
www.jukuu.com
8.
Then introduces spectral clustering algorithm based on deficiencies of variety of traditional clustering algorithms on intrusion detection.
然后分析了各种传统聚类算法在入侵检测中所表现的不足,并引入了谱聚类算法加以解决。
www.fabiao.net
9.
The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.
文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。
www.magsci.org
10.
As Intrusion Detection require analytical data which record system track, it applies to almost all computer systems.
由于入侵检测所需要的分析数据源主要是记录系统活动轨迹的审计数据,使其几乎适用于所有的计算机系统。
www.fabiao.net
1.
Behavioral data forensics emphasizes the course which supports ability of intrusion detection on the judge.
行为数据辨析强调入侵检测的判定支持能力的过程。
www.xactad.org
2.
Examples of clustering IRIS data and alerts in intrusion detection also proved the good performance of the KSOM method.
对IRIS数据集和入侵检测报警数据的聚类也证明了核自组织映射聚类方法的良好性能。
www.ceps.com.tw
3.
Anomaly monitoring is an important branch of intrusion detection.
网络异常监测是入侵检测领域的一个分支。
www.fabiao.net
4.
Intrusion detection technology is a kind of network security technology that protects network initiatively to exempt to be attacked.
入侵检测技术是一种主动保护网络免受攻击的网络安全技术。
www.ceps.com.tw
5.
Intrusion detection system monitors computer network by looking for signs of malicious behavior.
入侵检测系统通过寻找恶意行为的迹象来监控计算机网络。
www.xactad.org
6.
The SonicWALL's intrusion detection and prevention abilities include digital rights management, P2P and instant messaging controls.
其入侵检测和防护能力包括数字版权管理、P2P和IM(即时通信)控制。
www.bing.com
7.
The paper provided a new model, the interaction with vulnerability scanner and Intrusion Detection System (IDS).
提出漏洞扫描与入侵检测系统联动工作模型。
www.ceps.com.tw
8.
Intrusion detection which protects system actively from hacker's attacks is a new technique during these two decades.
入侵检测技术是近20年来出现的一种主动保护系统、免受黑客攻击的新型网络安全技术。
www.13191.com
9.
To form node intrusion detection system by combining the character of host intrusion detection system and net intrusion detection system.
并结合基于主机入侵检测系统和基于网络入侵检测系统的各自特点,形成了节点入侵检测系统。
www.fabiao.net
10.
It's true that both intrusion detection and Snort usage extends well beyond Web sites and into larger network security issues.
确实,入侵检测和Snort的使用都超越了Web站点本身,延伸为更广泛的网络安全问题。
www.ibm.com
1.
This paper also indicates that evaluation of intrusion detection system on large scale network is the trend today.
指出进行大规模分布式网络入侵检测系统的测试是目前研究的热点。
www.magsci.org
2.
Chapter two recommend the Common Intrusion Detection Frame (referred to as CIDF), that is a specification of communication among IDSes.
第二章又介绍了公共入侵检测框架(CIDF),该框架为入侵检测系统间的通讯提供了规范;
www.fabiao.net
3.
Consider security measures like Firewall and Intrusion Detection System.
要考虑采用防火墙及入侵侦测系统等保安措施。
www.info.gov.hk
4.
The method applied in intrusion detection system can divide exactly between normal data and abnormal date.
将这个方法应用到入侵检测系统中,能较好地将正常数据和异常数据区分开。
www.ceps.com.tw
5.
Deepen our understanding of the intrusion detection system works.
加深理解了入侵检测系统的工作方式。
www.boshuo.net
6.
Disables the Intrusion Detection System, leaving your computer open to network attacks.
禁用入侵检测系统,将您的计算机对网络攻击开放。
bbs.360safe.com
7.
How to extract sequence patterns of system calls is an important research topic of system call based intrusion detection approaches.
在基于系统调用的入侵检测研究中,如何提取系统调用序列模式是一个重要问题。
www.ceps.com.tw
8.
Aimed at the security problem existing in WLAN, a WLAN intrusion detection and response system has been designed.
针对无线局域网当前存在的安全问题提出了一种无线局域网入侵防范及响应系统的设计方案。
www.fabiao.net
9.
The main contributions in this paper are as follows: 1. Research and build a state-based intrusion detection system (IDS); 2.
本论文的工作主要体现在如下方面:1。研究并搭建基于状态迁移的入侵检测系统;
www.boshuo.net
10.
Using RVM in the intrusion detection the generalization ability of the IDS is good when the sample size is small.
应用RVM的对小样本的良好分类能力,提出一种基于RVM的人侵检测原型系统。
www.ceps.com.tw
1.
The main contributions in this paper are as follows: 1. Research and build a state-based intrusion detection system (IDS); 2.
本论文的工作主要体现在如下方面:1。研究并搭建基于状态迁移的入侵检测系统;
www.boshuo.net
2.
Using RVM in the intrusion detection the generalization ability of the IDS is good when the sample size is small.
应用RVM的对小样本的良好分类能力,提出一种基于RVM的人侵检测原型系统。
www.ceps.com.tw
3.
The experiments show that the algorithm is efficient and can get better intrusion detection rules.
最后通过实验证明了此算法的有效性,可以较好地获得入侵检测规则。
ceaj.org
4.
Optimizing configuration for intrusion detection system (IDS) is a new research area for IDS.
入侵检测系统的优化配置是当前IDS研究的新兴领域。
www.ceps.com.tw
5.
The Intrusion detection system(IDS) is one kind of defense system for network, It is passive.
入侵检测系统是一种被动的安全防御方法。
www.fjqi.gov.cn
6.
The paper also discusses a new intrusion detection technology: protocol analysis.
本文接下来讨论了一种新的检测技术—协议分析。
www.edu-hb.com
7.
A novel rough set-based method followed by establishing a mix discernibility matrix is introduced for intrusion detection, and choose C4.
针对入侵检测问题,提出了构造混合辨别矩阵的方法,并用C4。
www.dictall.com
8.
The theory of intrusion detection is mature after scholars have being studied it for so many years.
经过专家学者们数十年的努力,入侵检测技术在理论上已经比较成熟。
www.fabiao.net
9.
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
www.ibm.com
10.
In this paper, an intrusion detection scheme is proposed to detect internal routing attacks.
提出了一个基于模糊行为分析的入侵检测方案,以检测网络内部的路由攻击。
www.ceps.com.tw
1.
This paper analyzes the database security monitoring system based on intrusion detection and intrusion tolerance technique.
本文分析了基于入侵检测技术与入侵容忍技术的数据库安全监控系统。
www.fabiao.net
2.
Advanced detective technology is a key factor in the research on intrusion detection.
先进的检测算法是入侵检测研究的关键技术。
stae.com.cn
3.
Finally, we propose a method of application-level database intrusion detection.
最后,给出了一种针对应用级数据库入侵的检测方法。
www.fabiao.net
4.
Defending the network when intrusion detection and firewalls fail.
当攻击检测和防火墙失败时的网络防御。
www.flukenetworks.com.cn
5.
In this paper, a data mining-based network intrusion detection system model is introduced.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
kns50.chkd.cnki.net
6.
This paper presents a level of collaboration hybrid Distributed Intrusion Detection System Model.
本文提出了一种层次化协作的混合型分布式入侵检测系统模型。
www.jylw.com
7.
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
www.fabiao.net
8.
In the realization of data mining-based intrusion detection system (DMIDS), feature construction is a key process.
在DMIDS的实现过程中,特征构造是一个关键环节。
www.dictall.com
9.
In this thesis, some research on feature selection and ensemble learning and their applications in intrusion detection are carried out.
本文将围绕特征选择、集成学习及其在入侵检测中的应用三个方面展开研究。
202.119.108.211
10.
The high-speed network put forward higher request to intrusion detection system.
高速网络对入侵检测系统的处理性能提出了更高的要求。
www.fabiao.net
1.
In order to maintain network security, common intrusion detection systems have to monitor the entire network environment.
为了维护网路安全,一般的入侵侦测系统必需全面的监控网路环境的所有讯息。
ir.lib.ncu.edu.tw
2.
Current intrusion detection system in general there is poor adaptability, false, omitted the issue of data overload.
现有入侵检测系统一般存在着自适应性差、误报、漏报问题、数据过载等问题。
kns50.chkd.cnki.net
3.
Based on the in-deep research on inductive learning theory, a rule learning algorithm is applied in building the intrusion detection model.
在对归纳学习理论深入研究的基础上,将规则学习算法应用到入侵检测建模中。
www.dictall.com
4.
Distributed intrusion detection system collects data based on sensors, and send data to still agent (also, local agent) for analysis.
分布式入侵检测系统需要通过传感器获得网络的实际状况,并通过基于网络的静止代理进行数据的初步分析。
www.fabiao.net
5.
One is how to apply data mining technology to IDS . the other is about technologies that are adopted by intrusion detection engine.
显然采用数据挖掘技术来辅助安全专家提取入侵特征,编写入侵检测规则是一个很好的办法。
www.juhe8.com
6.
There's also information on buffer overflows, firewalls, intrusion detection, and lots more.
还有有关缓冲区溢出、防火墙、入侵检测等更多内容。
www.ibm.com
7.
Another problem with signature-based intrusion detection is that it can only match malicious activity with known forms of attack.
另一个基于特征的入侵检测系统的问题是只能将恶意行为与已知攻击行为进行匹配。
dictsearch.appspot.com
8.
Intrusion Detection is an important way to protect information security. It has great influence on the development of network application.
入侵检测是保护信息安全的重要途径,对网络应用的发展具有重要意义与深远影响。
www.magsci.org
9.
It can be propitious to enhance detective precision and to reduce burthen of the intrusion detection system.
此过程有利于提高检测的精确度同时降低系统的负荷。
www.fabiao.net
10.
Thus, they are used in intrusion detection, it will generate multiple insignificant rules and even they are misguided.
因此,将其应用于入侵检测时,很可能挖掘出大量无用规则,甚至是误导的规则。
dictsearch.appspot.com
1.
Every sub-net which is controlled by control agent adopts different intrusion detection analysis method.
各个控制agent所控制的子网段采用不同的入侵检测分析方法。
www.juhe8.com
2.
Distributed intrusion detection systems( DIDS) have many advantages such as scalability, subversion resistance.
分布式入侵检测系统有许多优点,如可测量性和抗破坏性。
dict.veduchina.com
3.
Such as handwritten Chinese character recognition, face recognition, network intrusion detection.
如手写汉字识别,人脸识别,网络入侵检测等。
www.boshuo.net
4.
Applying a two-stage clustering algorithm to the intrusion detection, a IDS model based on data stream is designed.
将两阶段聚类算法应用于入侵检测,设计了基于数据流的入侵检测系统模型。
kns50.chkd.cnki.net
5.
In this paper, a novel real-time and dynamical rule generation method for network intrusion detection stream was proposed.
本文提出了一种针对网络入侵检测事务流的实时动态规则生成方法。
www.dictall.com
6.
As an important part of network security, Intrusion Detection System(IDS) softwares, such as NFR, ISS, are still main equipments of today.
作为网络安全的重要组成部分,网络入侵检测软件,如NFR、ISS等仍是目前的主要工具。
www.fabiao.net
7.
Detecting engine is core of PNIDS, pattern matching is being apply ed in intrusion detection.
检测引擎是PNIDS系统核心,其中检测技术采用了模式匹配方法。
www.fabiao.net
8.
The intrusion detection sensor is also in this list, and it is triggered when tampering of the physical device is detected.
入侵检测传感器也在此列表中,当检测到物理设备被干扰时将触发该传感器。
www.ibm.com
9.
In order to improve the performance of IDS (Intrusion Detection System), a synthetic dimension reduction method is proposed in this paper.
为了提高入侵检测系统的性能,提出了一种综合降维方法。
www.ceps.com.tw
10.
SO the RBF network is very suitable for intrusion detection test which has the high requirements of efficiency and speed.
并且RBF网络结构也简单、学习速度快,非常适合入侵检测对于检测效率和速度的高要求。
www.boshuo.net
1.
An ideal intrusion detection system must have high detection rate and low false alarm rate in the same time, besides high performance.
理想的入侵检测系统不仅需要同时具备高的检测率和低的误报率,检测的速度也成为必须考虑的因素。
www.fabiao.net
2.
The Intrusion Detection is a new security technology, apart from tradition security protect technology, such as firewall and data crypt.
入侵检测技术是继“防火墙”、“数据加密”等传统安全保护措施后新一代的安全保障技术。
www.jukuu.com
3.
Finally, an intrusion detection system model based on hybrid neural network is presented.
最后,提出了一种基于混合神经网络的入侵检测系统模型。
www.fabiao.net
4.
Other application areas include intrusion detection, web log analysis, database access patterns, and so on.
其他的应用领域还包括侵入检测、Web日志分析、数据库访问模式等等。
www.ibm.com
5.
So what is an intrusion detection system, anyway?
那么究竟什么是入侵检测系统?
www.ibm.com
6.
And then, the development of the audit management model and intrusion detection model further controls the accession of the user.
之后对审计管理与流量管理模块的开发则进一步监管了用户的访问;
www.fabiao.net
7.
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
www.ibm.com
8.
This paper presents an intrusion detection module based on mobile agents, which utilizes IP Traceback technique.
本文提出了一种基于移动代理技术可回溯的入侵检测系统模型。
dictsearch.appspot.com
9.
Research on host modeling and intrusion detection based on two-lay Hidden Markov Model.
基于两层隐马尔可夫模型的主机行为建模与异常检测方法研究。
www.juhe8.com
10.
Does the facility have an intrusion detection or alarm system?
工厂是否有非法进入监测和报警系统?
blog.sina.com.cn
1.
In this paper, an intrusion detection method based on fuzzy genetics is presented.
提出一种基于模糊遗传学习的入侵检测方法。
www.ceps.com.tw
2.
You will need to consider network traffic monitors, rate limiters, intrusion detection tools, and more.
您需要考虑网络流量监视器、速率限制器、入侵检测工具,等等。
www-128.ibm.com
3.
In view of above, we design and implement a prototype system of intrusion detection.
在以上的基础上设计并实现了一个基于CORBA的入侵检测系统模型。
www.lw23.com
4.
At present, intrusion detection system faces some problems: a large quantity of data, memory lacking, and so on.
目前,入侵检测系统面临数据量大、内存等系统资源不足的问题。
kns50.chkd.cnki.net
5.
This paper designed a kind of load balancing technology in a intrusion detection system based on cluster (HMNIDS).
本文对一个基于负载均衡技术的集群式入侵检测系统〔HMNIDS〕的各个模块进行了优化设计。
cyggao.com
6.
You need to consider network traffic monitors, rate limiters, intrusion detection tools, and more, in order to defend against a DoS attack.
为了防范DoS攻击,需要考虑网络通信量监视器、速率限制器、入侵检测工具等等。
www.ibm.com
7.
The method is based on the intrusion detection model and the entropy is used as the criterion.
该方法以入侵检测模型为基础,信息熵为准则。
www.ceps.com.tw
8.
Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.
入侵检测技术可以在网络系统受到损害前对入侵行为做出拦截和响应。
www.magsci.org
9.
On the other hand, EACA is used in intrusion detection module, which makes new intrusions be detected.
另一方面,改进的蚁群算法也使该系统能够有效地检测出新的入侵行为。
www.juhe8.com
10.
A study of a IDS model based on dynamic clonal selection and its application to searching core attribute set of intrusion detection
基于动态克隆选择的入侵检测及其搜索核特征的研究
ilib.cn
1.
Study of a cooperative agent-based distributed intrusion detection model
基于多智能体协同的分布式入侵检测模型研究
ilib.cn
2.
Integrated Security Protection Equipment; Traffic Statistics; Intrusion Detection; Border Access Control; Fuzzy Comprehensive Evaluation;
一体化安全防护设备;流量统计;入侵检测;边界访问制约;模糊综合评判;
www.zidir.com
3.
Design and Implementation of a Real-time Intrusion Detection Expert System
一种实时入侵检测专家系统的设计与实现
www.wanfangdata.com.cn
4.
The Research for an Improved Dynamic Clonal Selection Algorithm Applied to Intrusion Detection
一种改进的动态克隆选择免疫算法在入侵检测中的应用研究
www.ilib.cn
5.
This thesis begins with studying attacking technology, including introducing the classification of the intrusion detection systems(IDS);
本文从研究入侵检测技术入手,介绍了入侵检测系统的分类;
www.ceps.com.tw
6.
The Design and Implementation of a Sensor part of Network-based Distributed Intrusion Detection System
基于网络的分布式入侵检测系统传感器模块设计与实现
ilib.cn
7.
Study of Equivalence of Similarity Measurement for Intrusion Detection Clustering
入侵检测聚类中相似性度量的等效性研究
www.ilib.cn
8.
Design and Implementation of a Tree-Structured Distributed Intrusion Detection System
一种树形结构分布式入侵检测系统的设计与实现
www.ilib.cn
9.
Study and Implementation of a Hardware-based System for Immunological Intrusion Detection
免疫入侵检测系统的一种硬件实现方法研究
www.ilib.cn
10.
Immunology principle and its application investigation in intrusion detection
免疫学原理在入侵检测中的应用研究
service.ilib.cn
1.
Vulnerability-scanning technology and its application in intrusion detection system
漏洞扫描技术及其在入侵检测系统中的应用
www.ilib.cn
2.
Implementation of a Multiple Agent-based Technology for Intrusion Detection System
多代理技术在入侵检测中的应用
ilib.cn
3.
Research and Implementation of a High-Performance Distributed Intrusion Detection System
一种高性能分布式入侵检测系统的研究与实现
ilib.cn
4.
Study of Distributed Intrusion Detection Architecture
分布式入侵检测体系结构研究
scholar.ilib.cn
5.
Design and Implementation of a Multi-Agent-Based Technology for Intrusion Detection Systems
一种基于多代理机制的入侵检测技术及其实现
ilib.cn
6.
Building Intrusion Detection System Models with an Improved Algorithm of Association Rules
用改进的关联规则算法建立入侵检测系统模型
service.ilib.cn
7.
A Study of a Distributed Intrusion Detection Model
分布式入侵检测模型研究
www.ilib.cn
8.
A Novel Temporal Scenario Recognition Algorithm and Its Application in Intrusion Detection Alert Fusion
一种时间场景识别算法及其在安全报警熔合中的应用
www.ilib.cn
9.
Intrusion Detection Architecture Under Specific Application Environment
特定应用环境下的入侵检测架构
www.ilib.cn
10.
Investigation of integrated system of distributed intrusion detection with firewall and its implementation
分布式入侵检测系统和防火墙技术结合的研究与实现
ilib.cn
1.
A Improved Algorithm of Chunking Support Vector Clustering and Its Application in Intrusion Detection
改进分块支持向量聚类在入侵检测中的应用
service.ilib.cn
2.
An Investigation of a Negative Selection and Clonal for Network Intrusion Detection
负向选择和克隆在网络入侵检测应用上的研究
service.ilib.cn
3.
Research and Design of a Model Agent- Based Distributed Intrusion Detection System
基于Agent的分布式入侵检测系统模型的研究与设计
ilib.cn
4.
Improved fuzzy clustering algorithm and its application to intrusion detection
改进模糊聚类算法及其在入侵检测中的应用
www.ilib.cn
5.
Study of computer network intrusion detection technology
计算机网络入侵检测技术研究
www.ilib.cn
6.
The research of a adaptive framework for data mining based intrusion detection system
基于数据挖掘的自适应入侵检测系统
www.ilib.cn
7.
Current State and Prospect of the Application of Data Mining Techniques for the Intrusion Detection System
数据挖掘技术在入侵检测系统中的应用现状及展望
www.ilib.cn
8.
Design of the System for Intelligent Intrusion Detection
智能型入侵检测模型的设计
ilib.cn
9.
Lightweight Agent for Collaborative Distribution Intrusion Detection System
基于轻负载代理的协同分布式入侵检测系统
ilib.cn
10.
Distributed Intrusion Detection Technology Application in Networked Control System
分布式入侵检测技术在网络控制系统中的应用
www.ilib.cn
1.
Research on intrusion detection techniques in information security infrastructures
信息安全设施中入侵检测技术探讨
www.ilib.cn
2.
The Application of an Improved Temporal Algorithm of Association Rules to Intrusion Detection
改进的时态关联规则在入侵检测中的应用
ilib.com.cn
3.
The Cooperation Mechanism Study of Intrusion Detection System
入侵检测系统协同机制的研究
www.ilib.cn
4.
Study of unsupervised and adaptive intrusion detection system
无监督自适应入侵检测系统研究
service.ilib.cn
5.
The design and implementation of a new distributed intrusion detection system
一种新型分布式入侵检测系统的设计与实现
ilib.cn
6.
An Improved Algorithm for Pattern Matching and Its Application in Intrusion Detection System
改进的模式匹配算法及在入侵检测中的应用
www.ilib.cn
7.
An Efficient Feature Selection Algorithm Toward Building Lightweight Intrusion Detection System
一种高效的面向轻量级入侵检测系统的特征选择算法
www.ilib.cn
8.
Firewall; Intrusion detection system; Intrusion prevention system; Pattern matching; AC-BM algorithm;
防火墙;入侵检测系统;入侵防御系统;模式匹配;AC-BM改善算法;
www.zidir.com
9.
Study of Pattern Matching Algorithms in Intrusion Detection System
入侵检测系统中模式匹配算法的研究
alicanteinfo.cn
10.
The Solving Scheme of Application Bottleneck of a High-speed Network Intrusion Detection System
高速网络入侵检测系统应用瓶颈解决方案
scholar.ilib.cn
1.
Design and Implementation of the Online Intrusion Detection Mechanism in Security Database Systems
安全数据库系统中在线入侵检测的设计与实现
service.ilib.cn
2.
Design of a new type integrated classifier for network intrusion detection system
网络入侵检测系统的新型综合分类器
ilib.cn
3.
Interaction Technology Research with Distributed Firewall and Intrusion Detection System
分布式防火墙与入侵检测系统的联动研究
ilib.cn
4.
Design and Implementation of an Intrusion Detection System Using System Call Serial Analysis
一种分析系统调用序列的入侵检测系统设计与实现
www.ilib.cn
5.
Design of an Unsupervised Learning Analyzer in Network Intrusion Detection Systems
网络入侵检测系统中无导师学习分析器的设计
service.ilib.cn
6.
The Application of the Data Mining Technology to the System of Intrusion Detection
数据挖掘在入侵检测系统中的应用
service.ilib.cn
7.
Firewall with Intrusion Detection System Application in Clothing Business Enterprise's Information Network
防火墙和入侵检测系统在服装企业信息网络中的应用
ilib.cn
8.
Comparison and Analysis of Two Audit Data Reduction Methods for Intrusion Detection System
入侵检测系统中两种审计数据缩减技术的比较与分析
www.ilib.cn
9.
Research on weighted multi-random decision tree and its application to intrusion detection
基于加权多随机决策树的入侵检测分类算法
scholar.ilib.cn
10.
Construction of A Safe Campus Network Using Intrusion Detection System to
利用入侵检测系统构建安全的校园网
www.ilib.cn
1.
A Distributed Intrusion Detection System and Its Apperception Ability
分布式入侵检测系统及其认知能力
ilib.cn
2.
Application of a Data Mining Algorithm in Intrusion Detection System
一种数据挖掘算法在入侵检测系统中的应用
www.ilib.cn
3.
Design and Implementation of a SNMP-based Intrusion Detection System
基于SNMP的入侵检测系统的设计与实现
www.ilib.cn
4.
Realization of a Novel Adaptive Intrusion Detection System
一种新型的自适应入侵检测系统的研制
service.ilib.cn
5.
Application of Agglomerate Layered Clustering Arithmetic in Intrusion Detection
凝聚分层聚类算法在入侵检测中的应用
www.ilib.cn
6.
A Security Model Integrating Firewall and Intrusion Detection System in Distributed Network Environment
分布式网络环境下集成防火墙和入侵检测系统的安全模型
ilib.cn
7.
Antibody Generation and Antigen Detection Component in Immune -Based Network Intrusion Detection System
基于免疫机理的网络入侵检测系统的抗体生成与检测组件
ilib.cn
8.
Research of a Hybrid Intrusion Detection System Based on Particle Swarm Optimization and Artificial Immunology
基于粒子群和人工免疫的混合入侵检测系统研究
www.ilib.cn
9.
A Study of Architecture for Fusion-Based Intrusion Detection Systems
基于信息融合入侵检测系统的体系结构研究
ilib.cn
10.
Communication Mechanism of Distributed Intrusion Detection System
分布式网络入侵检测系统中的通信设计
scholar.ilib.cn
1.
Implementation of the Distributed Intrusion Detection System
分布式入侵检测系统的实现
www.ilib.cn
2.
Research on credibility and its improved policy for intrusion detection system
入侵检测系统的可信性及其改进策略研究
www.ilib.cn
3.
Research on a Message Driven Communication Scheme for Distributed Intrusion Detection
基于消息驱动的分布式入侵检测通信机制
www.ilib.cn
4.
The application of BP neural network in intrusion detection system and its optimization
BP神经网络在入侵检测系统中的应用及优化
www.ilib.cn
5.
The Principle of Intrusion Detection and Its Application in Network Information System
入侵检测的原理及其在网络信息系统中的应用
www.ilib.cn
6.
Research of an Efficient Hash Pattern Tree Algorithm in Network Intrusion Detection
网络入侵检测中高效散列模式树算法的研究
service.ilib.cn
7.
XML-based Intrusion Detection Unified Representation and Secure Transportation
基于XML的入侵检测统一表达与安全传输
service.ilib.cn
8.
Research of Improved Bayesian Classification Arithmetic in Intrusion Detection
改进贝叶斯分类算法在入侵检测中的研究
www.ilib.cn
9.
Study and Implementation of a Net-based Intrusion Detection System
一种基于网络的入侵检测系统的研究与实现
www.ilib.cn
10.
Design and Implementation of Distributed Intrusion Detection System for Enterprise Network
基于企业网的分布式入侵检测系统的设计与实现
ilib.cn
1.
Research and Implementation of Alert Correlation in Distributed Intrusion Detection System
分布式入侵检测系统中告警相关的研究与实现
www.ilib.cn
2.
Design of a Distributed Intrusion Detection System Model
一个分布式入侵检测系统模型的设计
www.ilib.cn
3.
The Security Study of Mobile Agent Intrusion Detection Systems
入侵检测系统的安全研究
ilib.cn
4.
Analysis for Application of the Intrusion Detection System in a Library
浅析入侵检测系统在图书馆的应用
service.ilib.cn
5.
The Production History and Developing Directions of the Intrusion Detection System
入侵检测系统的产生过程及发展方向
www.ilib.cn
6.
transductive inference; association rule mining; mining spam, newsgroups, blogs; intrusion detection and networks;
转导推理,关联规则挖掘,挖掘垃圾邮件,新闻,博客,入侵检测和网络;
ccebook.cn
7.
Design of an intrusion detection model for detecting distributed attacks
一个检测分布式攻击的入侵检测模型的设计
www.ilib.cn
8.
A Time- Window Based Algorithm for Intrusion Detection
一个基于时间窗口的入侵检测算法
www.ilib.cn
9.
Security Architecture and Intrusion Detection Techniques of Wireless Networks
无线网络的安全架构与入侵检测的研究
www.ilib.cn
10.
Data generalization and exploration of distributed Intrusion Detection System
分布式入侵检测系统数据概化和探查
www.ilib.cn
1.
Research for Computational Intelligence and Immunology to Intrusion Detection
计算智能及免疫理论在入侵检测中的应用研究
www.ilib.cn
2.
Kernel nearest neighbor rule and its application in intrusion detection
核的最近邻算法及其仿真
www.ilib.cn
3.
Application of the Dynamic Clonal Selection Algorithm in Intrusion Detection
动态克隆选择算法在入侵检测应用中的研究
www.ilib.cn
4.
Design of a Distributed Intrusion Detection System
一种分布式入侵检测系统的设计
www.ilib.cn
5.
Constructing Pattern-Matching Automaton for Intrusion Detection System
一种构造入侵检测系统模式匹配自动机的方法
scholar.ilib.cn
6.
Summary About Intelligent Intrusion Detection Technology
智能入侵检测技术概述
service.ilib.cn
7.
An Intrusion Detection Experimental System Using Evolutionary Neural Network
一种基于进化神经网络的入侵检测实验系统
service.ilib.cn
8.
Study on Intrusion Detection in Network Security System and its Application
入侵检测技术在网络安全中的应用研究
ilib.cn
9.
Study on Multi-Hierarchical Fuzzy Comprehensive Evaluation of Intrusion Detection System
入侵检测系统的多层次模糊综合评价研究
www.ilib.cn
10.
The Negotiation Protocols of Intrusion Detection System in Distributed Environment
入侵检测系统在分布式环境下的协作协议
www.ilib.cn
1.
Feature Selection Using Multi-Objective Genetic Algorithms for Intrusion Detection
面向入侵检测的基于多目标遗传算法的特征选择
www.ilib.cn
2.
Intrusion Detection Technology and the Analysis of Its frangibility
入侵检测技术及其脆弱性分析
www.wanfangdata.com.cn
3.
Research and Implementation of Close Combination of Honeynet Firewall and Intrusion Detection
蜜网与防火墙及入侵检测的无缝结合的研究与实现
ilib.cn
4.
Survey of the Application Research of Fuzzy Technology to Intrusion Detection Systems
模糊技术在入侵检测系统中的应用研究综述
www.ilib.cn
5.
Study of Intrusion Detection System's Testing and Evaluating
入侵检测系统测试研究
ilib.cn
6.
Design and Implementation of Distributed Intrusion Detection's Architecture for High-Speed Network
一种高速网络下分布式入侵检测体系结构的设计与实现
service.ilib.cn
7.
Design and Implement of a New Intrusion Detection and Recovery System
一种新的入侵监测恢复系统的设计与实现
service.ilib.cn
8.
Design of a Distributed Intrusion Detection Model
一种分布式入侵检测模型的设计
www.ilib.cn
9.
A Study of Load Balance of Intrusion Detection System in High-speed Networks
高速网络环境下入侵检测系统负载均衡的研究
www.ilib.cn
10.
Immune Principle and Its Application in Intrusion Detection
免疫机制在计算机网络入侵检测中的应用研究
service.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/11/13 3:53:39