• Therefore, it is necessary to design more excellent Peer-to-Peer network security model.

    因此需要设计更为完善安全模型

    youdao

  • In this paper we analyze and compare the existing network security model and quantitative assessment methods.

    网络安全性量化评估问题是目前网络安全领域的研究热点之一。

    youdao

  • This paper propose a dynamic network security model with immune character. This model bases on the traditional static defense model.

    本文传统静态防御模型提出具有免疫特性动态网络安全模型。

    youdao

  • On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).

    本文P2DR(策略、防护、检测、响应)安全模型基础上,详细论述了内部网行为监管审计系统设计实现

    youdao

  • According to the shortcomings of the traditional PDM security management, this paper establishes a workspace-based authorization management model and a DPDM network security model.

    本文针对传统PD M安全管理缺点建立了基于工作空间的权限管理模型网络安全模型。

    youdao

  • The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.

    IT安全模型企业网络周围建立一刻巨大的微尘,受信任的、已授权员工穿越守卫严密的吊桥进入众所周知的城堡。

    youdao

  • The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.

    安全模型要求能够交互标识每个组件可以网络体系结构级别通过使用通用应用程序标识实现

    youdao

  • The architecture of the application doesn't match our { storage, network, deployment, security } model

    款产品体系结构我们的{存储网络部署安全}模型匹配

    youdao

  • However, the Flash Security model doesn't allow local files to access network resources and vice versa.

    不过FlashSecurity模块允许本地文件访问网络资源反之亦然

    youdao

  • The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.

    可信网络架构安全模型针对用户现有网络安全资源进行有效整合管理的。

    youdao

  • Analyzing the essential characteristic of the network security situation assessment, and the reasoning model is proposed.

    分析网络安全态势估计问题的本质特征,构造了网络安全态势推理评估求解模型。

    youdao

  • To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.

    提出网络安全基于多传感器数据融合技术入侵检测模型对入侵检测系统体系结构进行了详细介绍

    youdao

  • This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.

    文章提出了一个网络安全防护动态模型,并基于模型实现了系统原型

    youdao

  • The Scheme Choice Optimization Model was expounded based on coordinating agent to meet the need of dynamic network information security management.

    根据网络动态信息安全管理需求,提出协调代理方案选择优化数学模型

    youdao

  • Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.

    通过实例分析证明了算法模型适合全面分析网络安全性攻击可能采取行为方式

    youdao

  • The investigation results show that this model can be used to a comprehensive assessment of network security levels effectively.

    研究结果表明模型有效地网络安全等级进行综合评价

    youdao

  • Meanwhile, the security network architecture model also has some practical value.

    同时安全网络架构模型具有一定实用价值

    youdao

  • Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.

    论文深入研究网络通信技术安全技术基础上,构建了跨区域物流管理系统框架模型

    youdao

  • Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.

    网络节点之间存在安全依赖关系前提下,提出一个基于贝叶斯方法的网络攻击定位追踪模型

    youdao

  • This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm.

    文章分析比较目前安全态势评估方法提出了一种基于日志审计性能修正算法的网络安全态势评估模型

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Content filtering in network security is a new subject. This paper founds a complete content filtering model and implements the content filtering model in WWW proxy of TIS.

    内容过滤网络安全领域课题文章建立了一个完整的内容过滤模型在TISWWW代理服务实现内容过滤模型。

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.

    论述了信息安全基础:安全标准,安全表述模型网络安全体系结构几种典型安全技术。

    youdao

  • In addition, we analyse the security of the whole network system integrating the five-layer model of network security mechanism, and put forward the corresponding tactics for every layer.

    另外结合网络安全机制模型整体网络系统安全进行分析针对层的安全性提出相应策略

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定