• The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.

    现代企业网络安全防护常见安全问题及其影响探讨解决这些网络安全问题方法提供了基于网络内部的安全策略

    youdao

  • Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.

    如果网络安全控制IaaS网络基础设施中无效,就会出现虚拟化网络中基于网络的控制不足

    youdao

  • Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.

    通过网络运行软件软件解决方案中,身份验证授权私密性完整性不可否认性主要安全组件

    youdao

  • We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.

    我们建议,在造访地球先给自己网路设上密码并且请安装使用人类安全软件预防计算机攻击

    youdao

  • The thought of network security situation prediction based on cloud and an algorithm of network security situation prediction based on cloud were proposed.

    提出基于网络安全态势预测思想基于云的网络安全态势预测规则挖掘算法

    youdao

  • All in all, this constitutes a control challenge of insufficient network-based controls because tried-and-tested network-level security controls might not work in a given cloud environment.

    而言之,形成了一个控制上的问题,即不充分基于网络控制因为基于尝试与测试的网络级别安全控制可能某些云计算环境下无法工作

    youdao

  • To meet gigabit network's security requirement, people give several solutions, including implement based on general CPU, implement based on ASIC and implement based on network processor.

    面对千兆网络安全需求人们提出了不少解决方案其中主要基于通用CPU实现、基于ASIC实现基于网络处理器实现这三种。

    youdao

  • To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • The thought of network security situation prediction based on cloud doesn't need the initial data training, and the objectivity of predicting results is improved.

    基于网络安全态势预测思想需要预测算法进行数据训练提高了网络安全态势预测客观性

    youdao

  • An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.

    保证图像数字水印棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法

    youdao

  • The Scheme Choice Optimization Model was expounded based on coordinating agent to meet the need of dynamic network information security management.

    根据网络动态信息安全管理需求,提出协调代理方案选择优化数学模型

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.

    信息资源保护需求现状分析了当前网络信息安全通常采用技术以及身份验证技术现状。

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • An idea about the security transfer on network, which is based on the SSL3.0 protocol, is also put out at the end of this paper.

    最后,本文深入分析SSL3.0协议基础提出了一个网络应用安全传输构想。

    youdao

  • Based on the methods of network security counting and combined with the feature for wideband community information server, a security counting system is designed in this paper.

    现有网络安全计费方法基础上,结合宽带社区信息服务特点,设计一种基于社区信息服务的安全计费集成系统

    youdao

  • At last, the paper bring forward the network security protection architecture based on Intrusion Detection for a integrated network security cycle.

    最后构筑完整网络安全循环,本文提出建立入侵检测基础上的网络安全防护体系结构模型。

    youdao

  • This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.

    该文试图通过对企业网络构成安全需求的分析,提出基于自主密码技术企业广域网系统安全方案

    youdao

  • According to the shortcomings of the traditional PDM security management, this paper establishes a workspace-based authorization management model and a DPDM network security model.

    本文针对传统PD M安全管理缺点建立了基于工作空间的权限管理模型网络安全模型。

    youdao

  • This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.

    文章提出了一个网络安全防护动态模型,并基于模型实现了系统原型

    youdao

  • This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.

    提出网络安全基于多传感器数据融合技术入侵检测模型对入侵检测系统体系结构进行了详细介绍

    youdao

  • An physical approach of network security based on PCI bus is proposed, the design scheme of the core component, PCI control card, is introduced, and realization of some key technologies is described.

    提出基于PCI总线网络安全一种物理实现方法详细介绍了核心部件PCI控制板卡设计方案描述了其中几个关键技术实现

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络信息传输安全性

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • The purpose is to realize network security management and communications based on SNMP in the integrated network security System.

    目的集成化网络安全系统中实现基于SNMP的网络安全管理通信机制

    youdao

  • Start from District Intelligent system based on broadband network, the design object and whole construct schemes of its security system is presented.

    基于宽带网络小区智能化系统入手给出了安全系统设计目标整体构造方案

    youdao

  • This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm.

    文章分析比较目前安全态势评估方法提出了一种基于日志审计性能修正算法的网络安全态势评估模型

    youdao

  • Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.

    信息时代到来需要计算机安全防护由被动防御转向主动,因此基于欺骗网络安全策略日益受到重视

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络服务质量网络信息传输安全性

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络服务质量网络信息传输安全性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定