• This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.

    该文安全路由协议基础针对流量模式攻击提出一种基于数据链路监视攻击检测机制

    youdao

  • All the enterprise architectures based on your SOA need to support adequate mechanisms to ensure policy compliance and early detection of violations.

    所有基于SOA企业体系结构需要支持足够的机制确保策略遵从性违规情况早期检测

    youdao

  • Threat detection rules and security policy enforcement are needed.

    需要威胁检测规则执行安全策略

    youdao

  • InfoSphere Guardium provides powerful monitoring, detection, and protection capabilities-but companies also need proof that all policy violations have been investigated and remediated.

    InfoSphereGuardium提供强大的监视探测保护功能,但是公司需要证明所有策略违规经过了调查纠正

    youdao

  • With the same simple shake-detection algorithm above, a Perl script, and a monitoring policy, administrators will be better able to track the status of their hardware.

    使用同一个简单震动检测算法perl脚本一种监视策略管理员能够更好地跟踪硬件状态

    youdao

  • With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.

    模型动态策略管理基础,形成一个防护检测响应为一体的完整安全体系从而主机系统实施综合安全保护

    youdao

  • This language provided a common method of specifying protection, detection and response policies based on CNDPM model, which could be mapped to corresponding defense rules by policy engine.

    语言面向CNDPM模型能够统一描述保护检测响应策略通过策略引擎映射相应防御规则

    youdao

  • Identify changes to security policy, software configurations, and the addition of malware detection and prevention controls.

    认定安全策略软件配置恶意软件检测防御控制改变

    youdao

  • This paper mainly focuses on the security policy transformation and conflict detection techniques.

    本文安全策略转换冲突检测技术进行系统而深入的研究。

    youdao

  • Then, the dynamic identity authentication policy model is acquired according to Policy, Protection, Detection, and Response (P2DR) model and architecture.

    结合P2DR模型及其体系结构,得出动态身份认证P2DR安全模型;

    youdao

  • Intrusion Detection system (IDS) is an activity based network security system. As the logical supplement of usual passive policy, it is the important part of whole security system.

    入侵检测系统(IDS)一种基于主动策略网络安全系统,是对常用被动策略逻辑补偿网络安全系统中的重要组成部分

    youdao

  • Security policy transformation is a basic means for automatic policy configuration. Security policy conflict detection is an essential guarantee for correct policy configuration.

    安全策略转换实现策略自动配置基本手段,安全策略冲突检测是实现策略正确配置的根本保证

    youdao

  • Security policy transformation is a basic means for automatic policy configuration. Security policy conflict detection is an essential guarantee for correct policy configuration.

    安全策略转换实现策略自动配置基本手段,安全策略冲突检测是实现策略正确配置的根本保证

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定