• Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols.

    可以检查保存过滤器进口出口捕获数据包查看协议解码与广泛协议超过70分析最低

    youdao

  • Quantitative analysis and simulation result also show that it's feasible and effective to implement service discovery protocol based on existed route protocols using cross-layer design methodology.

    理论分析仿真实验结果表明采用跨层设计思想现有路由协议基础实现服务发现协议高效可行的。

    youdao

  • Quantitative analysis and simulation result also show that it's feasible and effective to implement service discovery protocol based on existed route protocols using cross-layer design methodology.

    理论分析仿真实验结果表明采用跨层设计思想现有路由协议基础实现服务发现协议高效可行的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定