通过这些数据预处理过程,大大提高了入侵检测系统对于应用层攻击如r2l、U 2r等模式攻击的识别能力,提高了入侵检测系统的性能。
By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
我们的问题是经典的瑞士银行模式也在规章的攻击下。
One problem is that the classic Swiss banking model is also under regulatory attack.
一旦这样做,开关维京人来攻击模式,所以他们掉到地上。
Once that's done, switch the Vikings to Assault Mode so they drop to the ground.
防守模式的分析给永野元帅下了一个死命令:他必须,用防守的方案也好,攻击的方案也好,保证南部防线的安全。
The logic of this defensive pattern imposes on Admiral Nagano an ironclad duty: he must, either by defensive or offensive measures, make the southern arc secure.
另一个研究揭示了当游戏者玩第一人称射击游戏时,大脑活动的模式与攻击行为发生时是一致的。
Another study revealed that gamers had patterns of brain activity consistent with aggression while playing first — person shooter games.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
在几乎是柏拉图理想模式的掩饰范例中,声明中的措辞谴责这起事件(至少确实将此次事件其描述成“攻击事件”),但并未具体将罪责推在任何一方身上。
In an almost Platonically ideal example of fudgery, the wording of the statement condemns the incident (which it does at least identify as an "attack"), but places the blame on nobody in particular.
本章也通过例子引入了一个攻击模式的概念。
This chapter also introduces the concept of an attack pattern via examples. This is a novel concept, but the specific patterns in the book invite additional development.
大多数开发人员听说过关于反模式的一个很好的例子:结构化查询语言(Structured Query Language,SQL)的错误使用导致Web站点受到 SQL 注入攻击。
Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.
此类攻击最著名的示例之一就是Windows动画光标攻击,这正是本文要讨论的模式。
One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.
在征服模式中,赢家是自己领地保护得最好而且拥有最多作战单元的那个(高等级的作战单元更为重要,他们通常是最具攻击力的)。
In Conquest Mode winner is the one whose land is better protected and who has more unites (unites of the better rank are more important, they often make good worst units).
但是最新的研究表明,开始看起来分散的袭击会随着攻击者改变他们的方法而显示出一定的模式。
But according to a new study, attacks that seem sporadic in the beginning can begin to show a pattern as the aggressors refine their methods.
同样的模式甚至也发生在身体攻击事件上,这取决于受害者的人格和具体环境。
The same kind of pattern can follow even physical assaults, depending on the circumstances and the personality of the victim.
情绪变化的男人更可能进入爬虫类动物模式,进行口头攻击或变得咄咄逼人。
A man who switches on his emotions is more likely to go into a reptilian mode and lash out vocally or become aggressive.
这种模式可以提供一个额外的安全层,并限制了对系统的攻击。
This pattern can provide an additional layer of security, and limit the attack surface of the system.
在十周年之际,该全球报告强调了安全团队在防御不断演进的网络犯罪和不断变化的攻击模式时,所面临的挑战和机遇。
On the ten anniversary, the global report highlights the challenges and opportunities faced by the security team in defense of evolving cyber crime and changing attack patterns.
困难模式的老板有更强的攻击和奴才和应该遇到的全方4骑士装备精良的门户。
The hard mode bosses have stronger attacks and minions and should be encountered with a full party of 4 well-equipped Portal Knights.
惩罚性父母不是一个能以细致入微的方式思考的人,而是一种攻击模式,哪怕是一丁点的故障和错误。
The punitive parent is not a person who is capable of thinking in a nuanced manner, but rather a mode that will attack even the slightest faults and mistakes.
同样地,一只灵能多头蛇蜥每轮也只能发动一次心灵攻击模式。
Likewise, a psionic hydra can only use one attack mode per round.
这将无法发现新的,未知的攻击无证攻击模式。
It will not be able to detect new, unknown attacks with undocumented attack patterns.
一旦这样做,开关维京人来攻击模式,所以他们掉到地上。
Once that's done, switch the Vikings to Assault Mode so they drop to the ground.
读者之所以能够照葫芦画瓢,是因为作者在书中传授的高见,可以使读者借以量身定做适合用来攻击斑马的模式。
Readers are able to do this because the authors have given them the insights they need to customize their attack on the zebras.
实验表明,该系统对已知攻击模式具有很高的检测率,对未知攻击模式也具有一定的检测能力。
Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.
处于激光锁定模式时,由于3秒的攻击前延迟,标枪兵对于任何形式的攻击都相当的脆弱。
While in Laser Lock mode, the Javelin Soldier is extremely vulnerable to any type of attack because of the 3 second pre-attack delay.
相信一个已经被黑客攻击的手机进入了飞行模式,就像相信一个醉酒的人去判断自己是否足够清醒到可以开车。
Trusting a phone that has been hacked to go into airplane mode is like trusting a drunk person to judge if they are sober enough to drive.
相信一个已经被黑客攻击的手机进入了飞行模式,就像相信一个醉酒的人去判断自己是否足够清醒到可以开车。
Trusting a phone that has been hacked to go into airplane mode is like trusting a drunk person to judge if they are sober enough to drive.
应用推荐