• The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.

    测试结果表明IIDS可以有效地检测网络入侵行为以及未知攻击模式,达到预期目标

    youdao

  • Using this table function instead of db2pd simplifies evaluation of the results because the index IDs (IIDs) can be converted to index names by joining with the SYSCAT.INDEXES catalog view.

    使用表函数取代 db2pd实用程序简化了结果计算因为可以通过与 SYSCAT.INDEXES 目录视图结合将索引IDs (IIDs)转换成索引

    youdao

  • Using this table function instead of db2pd simplifies evaluation of the results because the index IDs (IIDs) can be converted to index names by joining with the SYSCAT.INDEXES catalog view.

    使用表函数取代 db2pd实用程序简化了结果计算因为可以通过与 SYSCAT.INDEXES 目录视图结合将索引IDs (IIDs)转换成索引

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定