Sony was under heavy criticism over its handling of the network intrusion.
索尼在处理网络袭击事件上承受了巨大指责。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
The network protocol analysis is an essential technique in network intrusion detection.
网络协议分析是网络入侵检测中的一项关键技术。
In this paper, a data mining-based network intrusion detection system model is introduced.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
This thesis finally introduces the work of New Type Network Intrusion Detection System 'code.
本文最后介绍了新型网络入侵检测系统的编码工作。
How to improve the network intrusion detection technology has become a key topic in the IT field.
如何提高网络入侵检测技术也变为一个业界重点课题。
Such as handwritten Chinese character recognition, face recognition, network intrusion detection.
如手写汉字识别,人脸识别,网络入侵检测等。
In this paper, a new model of network intrusion detection based on active counterwork response is proposed.
在本论文中,我们提出了基于主动对抗响应的网络入侵检测模型。
In the design of the network intrusion system, the design of the intrusion detection engine is the key link.
网络入侵检测系统的设计中,入侵检测引擎的设计是关键。
According to the situation, this paper has proposed boldly the intelligent network intrusion detection model.
针对此现状,本文大胆地提出了智能化网络入侵检测模型。
Based on this idea, we design and develop a Neural Network-Based Network Intrusion Detection System prototype.
基于这个思路,我们设计并实现了一个基于神经网络技术的网络入侵检测系统原型。
The algorithm of network intrusion detection which based on ART2is an improvement grounded on automat-ic adaptive theory.
基于ART2的网络入侵检测算法是在自适应共振理论的基础上改进而来的。
In this paper, a novel real-time and dynamical rule generation method for network intrusion detection stream was proposed.
本文提出了一种针对网络入侵检测事务流的实时动态规则生成方法。
Apply SVM technique to network intrusion detection, and propose a network abnormal intrusion detection model based on SVM.
将支持向量机应用于网络入侵检测,提出一种基于支持向量机的网络异常入侵检测模型。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
As the paper shows, the performance of network intrusion detection is improved by the speed of the improved AC-BM algorithm.
正如本文中所显示的一样,由于采用了改进的AC -BM算法,网络入侵检测的性能有了改善。
It can help you ward off network intrusion and attacks, prevent information leakage, protect user machines network security.
它可以帮你抵挡网络入侵和攻击,防止信息泄露,保障用户机器的网络安全。
Major methods to distill network intrusion mode are class algorithm, association rule algorithm and frequent episodes algorithm.
提取网络入侵模式所用的主要有分类算法、关联规则算法和序列规则算法等。
The combined neural networks will be used to detect the network intrusion, afterwards the experiment result shows the methods are valid.
用该组合神经网络进行网络入侵检测,实验结果表明该组合方法是一种有效的入侵检测方法。
This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.
本文在分析现有网络入侵模式匹配BM算法的基础上,提出了改进BM规则匹配算法。
This paper presents a new intrusion prediction scheme based on case-based reasoning (CBR) for network intrusion detection system (CBRIP).
提出入侵预测技术模型可用于扩展网络入侵检测系统的功能。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.
生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义。
Model improves the efficiency of network intrusion detection system with a higher detection rate and low false negative rate by experiment.
通过实验证明,该模型提高了网络入侵检测系统的效率、有着较高的检测率和较低的漏报率。
The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .
ANIDS是基于异常检测技术的入侵检测系统,它从两个方面来实现异常检测。
Based on the framework of network intrusion detection systems based on data mining, this paper devises an analyzer model of unsupervised learning.
本文在基于数据挖掘的网络入侵检测系统框架基础上设计了一个无导师学习的分析器模型。
On the one hand today's society increasingly dependent on networks, network intrusion and attacks the other hand the number of incidents increased sharply.
方面当今社会对网络的依赖性日益增加,而另一方面网络入侵和攻击事件发生的次数也急剧增长。
On the one hand today's society increasingly dependent on networks, network intrusion and attacks the other hand the number of incidents increased sharply.
方面当今社会对网络的依赖性日益增加,而另一方面网络入侵和攻击事件发生的次数也急剧增长。
应用推荐