• 整个管理部分必须受到保护,防止网络入侵

    The overall management portion must be protected from intrusion at the network level.

    youdao

  • 网络入侵检测依赖字符串匹配技术

    Intrusion Detection System (IDS) often relies on string matching techniques.

    youdao

  • 入侵检测系统用来检测网络入侵行为的工具

    IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    youdao

  • 网络入侵模型

    The graph model of network attack.

    youdao

  • 网络协议分析网络入侵检测中的一项关键技术

    The network protocol analysis is an essential technique in network intrusion detection.

    youdao

  • 随着互联网络飞速发展,网络入侵行为日益严重

    With the internet fast developping, net inbreak action have been serious increasingly.

    youdao

  • 本文最后介绍新型网络入侵检测系统编码工作

    This thesis finally introduces the work of New Type Network Intrusion Detection System 'code.

    youdao

  • 如何提高网络入侵检测技术变为一个业界重点课题

    How to improve the network intrusion detection technology has become a key topic in the IT field.

    youdao

  • 本文提出了一种基于数据挖掘网络入侵检测系统模型

    In this paper, a data mining-based network intrusion detection system model is introduced.

    youdao

  • 网络入侵网络信息资源带来严重安全威胁

    Intrusion detection behaviors bring a serious safety threat for the information and resources of the network.

    youdao

  • 针对现状本文大胆地提出了智能化网络入侵检测模型

    According to the situation, this paper has proposed boldly the intelligent network intrusion detection model.

    youdao

  • 网络入侵检测系统设计入侵检测引擎的设计关键

    In the design of the network intrusion system, the design of the intrusion detection engine is the key link.

    youdao

  • 提出一种无线传感器网络入侵检测解决方案—MAIDS

    We propose a multi-agent based intrusion detection system (MAIDS) for wireless sensor networks.

    youdao

  • 本论文中,我们提出了基于主动对抗响应网络入侵检测模型

    In this paper, a new model of network intrusion detection based on active counterwork response is proposed.

    youdao

  • 网络入侵检测算法方面本文异常误用检测算法进行了研究

    On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    youdao

  • 本文提出针对网络入侵检测事务流实时动态规则生成方法

    In this paper, a novel real-time and dynamical rule generation method for network intrusion detection stream was proposed.

    youdao

  • 网络入侵指企图占用、偷窃或者毁坏他人计算机信息资源行为

    Intrusion detections are the behaviors that someone wants to occupy, seize or destroy other people's computer resource.

    youdao

  • 另一个结果强化美国或者其他地区的官方解决网络入侵强硬手段。

    Another will be to stiffen official resolve in America and elsewhere to tackle cyber aggression more forcefully.

    youdao

  • 面对层出不穷网络入侵技术网络病毒网络安全技术需要进一步研究

    In the face of endless hacking technology and network viruses and Internet security technology needs further study.

    youdao

  • 提取网络入侵模式所用的主要分类算法关联规则算法序列规则算法等。

    Major methods to distill network intrusion mode are class algorithm, association rule algorithm and frequent episodes algorithm.

    youdao

  • 可以抵挡网络入侵攻击防止信息泄露保障用户机器网络安全

    It can help you ward off network intrusion and attacks, prevent information leakage, protect user machines network security.

    youdao

  • 网络入侵一种可以检测分析入侵行为做出主动控制安全技术

    Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.

    youdao

  • 当前网络入侵事件不断发生使得网络安全管理技术成为当今人们关注热点

    Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.

    youdao

  • 随着网络入侵方法网络计算环境变化,使得入侵越来越难以被检测和防范。

    The ever-rising complexity of intrusion methods and communication networks has resulted in increased difficulty in detecting intrusion.

    youdao

  • 生物免疫系统自我保护机制设计新的网络入侵检测系统具有很好的借鉴意义。

    The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.

    youdao

  • 协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    youdao

  • 甚至都不必真正的网络入侵——只是对于可能发生这样的事情的观念就足以导致混乱。

    It wouldn't even have to be a real cyber intrusionjust the perception that one might have happened.

    youdao

  • 文章通过计算机网络入侵方法手段分析提出一些防范措施侦查取证方法。

    Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.

    youdao

  • 本文分析现有网络入侵模式匹配BM算法基础,提出改进BM规则匹配算法

    This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.

    youdao

  • 本文分析现有网络入侵模式匹配BM算法基础,提出改进BM规则匹配算法

    This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定