整个管理部分必须受到保护,防止网络入侵。
The overall management portion must be protected from intrusion at the network level.
网络入侵检测依赖于字符串匹配技术。
Intrusion Detection System (IDS) often relies on string matching techniques.
入侵检测系统是用来检测网络入侵行为的工具。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
网络入侵的图模型。
网络协议分析是网络入侵检测中的一项关键技术。
The network protocol analysis is an essential technique in network intrusion detection.
随着互联网络的飞速发展,网络入侵行为日益严重。
With the internet fast developping, net inbreak action have been serious increasingly.
本文最后介绍了新型网络入侵检测系统的编码工作。
This thesis finally introduces the work of New Type Network Intrusion Detection System 'code.
如何提高网络入侵检测技术也变为一个业界重点课题。
How to improve the network intrusion detection technology has become a key topic in the IT field.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
In this paper, a data mining-based network intrusion detection system model is introduced.
网络入侵为网络上的信息、资源带来了严重的安全威胁。
Intrusion detection behaviors bring a serious safety threat for the information and resources of the network.
针对此现状,本文大胆地提出了智能化网络入侵检测模型。
According to the situation, this paper has proposed boldly the intelligent network intrusion detection model.
网络入侵检测系统的设计中,入侵检测引擎的设计是关键。
In the design of the network intrusion system, the design of the intrusion detection engine is the key link.
提出一种无线传感器网络入侵检测解决方案—MAIDS。
We propose a multi-agent based intrusion detection system (MAIDS) for wireless sensor networks.
在本论文中,我们提出了基于主动对抗响应的网络入侵检测模型。
In this paper, a new model of network intrusion detection based on active counterwork response is proposed.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
本文提出了一种针对网络入侵检测事务流的实时动态规则生成方法。
In this paper, a novel real-time and dynamical rule generation method for network intrusion detection stream was proposed.
网络入侵是指企图占用、偷窃或者毁坏他人的计算机信息资源的行为。
Intrusion detections are the behaviors that someone wants to occupy, seize or destroy other people's computer resource.
另一个结果是,强化在美国或者其他地区的官方,解决网络入侵的强硬手段。
Another will be to stiffen official resolve in America and elsewhere to tackle cyber aggression more forcefully.
面对层出不穷的网络入侵技术和网络病毒,网络安全技术需要进一步研究。
In the face of endless hacking technology and network viruses and Internet security technology needs further study.
提取网络入侵模式所用的主要有分类算法、关联规则算法和序列规则算法等。
Major methods to distill network intrusion mode are class algorithm, association rule algorithm and frequent episodes algorithm.
它可以帮你抵挡网络入侵和攻击,防止信息泄露,保障用户机器的网络安全。
It can help you ward off network intrusion and attacks, prevent information leakage, protect user machines network security.
网络入侵诱控是一种可以检测分析并对入侵行为做出主动控制的安全新技术。
Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.
当前网络入侵事件不断发生,使得网络安全管理技术成为当今人们关注的热点。
Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.
随着网络入侵方法和网络计算环境的变化,使得入侵越来越难以被检测和防范。
The ever-rising complexity of intrusion methods and communication networks has resulted in increased difficulty in detecting intrusion.
生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义。
The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
这甚至都不必是场真正的网络入侵——只是对于可能发生这样的事情的观念就足以导致混乱。
It wouldn't even have to be a real cyber intrusion — just the perception that one might have happened.
文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。
Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.
本文在分析现有网络入侵模式匹配BM算法的基础上,提出了改进BM规则匹配算法。
This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.
本文在分析现有网络入侵模式匹配BM算法的基础上,提出了改进BM规则匹配算法。
This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.
应用推荐