• We propose a multi-agent based intrusion detection system (MAIDS) for wireless sensor networks.

    提出一种无线传感器网络入侵检测解决方案—MAIDS

    youdao

  • The main contributions in this paper are as follows:1. Research and build a state-based intrusion detection system (IDS); 2.

    论文的工作主要体现如下方面:1研究搭建基于状态迁移入侵检测系统

    youdao

  • This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.

    该文应用SVM分类特性识别网络攻击行为,提出了基于SVM入侵检测方法

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.

    移动代理在入侵检测中的应用”国家基础研究项目网络攻防技术子课题内容之一

    youdao

  • This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.

    该文分析基于主机基于网络入侵检测系统特点的基础上,提出一种电子商务安全审计系统的设计。

    youdao

  • In chapter 4, a new data mining-based Adaptive Models Generation (AMG) is introduced. AMG is a real-time architecture for implementing data mining-based intrusion detection system.

    第四章:介绍基于数据挖掘自适应模型生成(amg),AMG提供了一个基于数据挖掘的实时入侵检测结构。

    youdao

  • To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.

    针对现存入侵检测技术不足提出了一个基于贝叶斯网络混合式智能入侵检测模型。

    youdao

  • The first tools for meeting these requirements are system auditing and host-based intrusion detection.

    满足这些需求第一工具系统审计基于主机入侵检测

    youdao

  • Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.

    探讨免疫学基本原理基础提出了基于免疫学的代理系统用于联网计算机的入侵检测反应

    youdao

  • In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式

    youdao

  • Through setting up the model characteristic storehouse and describing the systematic procedure, this paper states its principle based on the description of the frame of Intrusion Detection system.

    入侵检测系统框架基础通过建立模式匹配的模型特征描述系统流程说明入侵检测系统的原理

    youdao

  • To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.

    针对这些问题本文提出了基于粗糙集理论的入侵检测系统方法。

    youdao

  • This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.

    本文首先简要介绍网络安全现状入侵检测技术CORBA 技术,然后给出应用CORBA建立分布式入侵监测系统体系结构

    youdao

  • In order to solve these problems, an intrusion detection system model based on AIS is put forward. Detection rules are produced by negative selection algorithm.

    为了解决这些问题提出了基于人工免疫原理的入侵检测模型,该模型使用筛选算法产生检测规则集。

    youdao

  • Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.

    分析现有分布式入侵检测系统拓扑结构基础设计实现自组织的层次式大规模网络入侵检测系统。

    youdao

  • This paper presents a new intrusion prediction scheme based on case-based reasoning (CBR) for network intrusion detection system (CBRIP).

    提出入侵预测技术模型可用于扩展网络入侵检测系统的功能。

    youdao

  • In order to overcome the limitations lied at the classic self-non-self thinking, this paper proposes a novel Intrusion Detection System(IDS) based on double-signal inspired by danger theory.

    为了克服传统“自我—非”模型的不足,设计一种新的基于危险理论的双信号协同入侵检测模型。

    youdao

  • In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.

    提出了一种基于系统调用序列入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式

    youdao

  • File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.

    文件系统完整性校验一种基于主机入侵检测技术可以检测入侵者主机文件非法修改

    youdao

  • The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测。

    youdao

  • An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge.

    为了克服入侵检测系统存在着在先验知识较少情况推广能力的问题,提出了基于粗糙理论的入侵检测方法

    youdao

  • This Paper designed a distributed intrusion detection system, which based on the component.

    本文设计了一种基于部件分布式入侵检测系统

    youdao

  • In this paper, a data mining-based network intrusion detection system model is introduced.

    本文提出了一种基于数据挖掘网络入侵检测系统模型

    youdao

  • According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.

    根据这种思想论文入侵检测基于系统调用入侵检测技术进行了深入分析和讨论。

    youdao

  • The thesis analyzes and researches the network security, the biologic immune system, intrusion detection and the network intrusion detection based on artificial immune firstly.

    本文首先网络安全生物免疫系统入侵检测以及基于人工免疫网络入侵检测进行分析研究

    youdao

  • Intrusion detection system based on network is differentiate self from nonself among huge network data.

    基于网络入侵检测系统就是大量的网络数据中区分出“自我”和“非我”。

    youdao

  • Intrusion detection system based on network is differentiate self from nonself among huge network data.

    基于网络入侵检测系统就是大量的网络数据中区分出“自我”和“非我”。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定