• The detection ways of matching attack signature was adopted in Process, its principle is same as most anti-virus software which require high efficiency.

    处理过程中采用攻击特征进行匹配的检测方式实现原理大多数杀毒软件类似,对效率的要求极高。

    youdao

  • The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.

    介绍了空战中超视距目标攻击过程分析了多目标攻击过程工作时序,及火控雷达对空空导弹截获概率的影响

    youdao

  • The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.

    通过对超视距空中机动目标分析合理的假设之后,提出了空空导弹攻击视距空中目标的基本模型

    youdao

  • By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.

    通过这些数据预处理过程大大提高入侵检测系统对于应用层攻击r2l、U 2r等模式攻击识别能力,提高了入侵检测系统性能

    youdao

  • By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.

    通过这些数据预处理过程大大提高入侵检测系统对于应用层攻击r2l、U 2r等模式攻击识别能力,提高了入侵检测系统性能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定