Therefore, it is necessary to design more excellent Peer-to-Peer network security model.
因此,需要设计更为完善的安全模型。
In this paper we analyze and compare the existing network security model and quantitative assessment methods.
对网络安全性的量化评估问题是目前网络安全领域的研究热点之一。
This paper propose a dynamic network security model with immune character. This model bases on the traditional static defense model.
本文在传统的静态防御模型上提出了具有免疫特性的动态的网络安全模型。
On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).
本文在P2DR(策略、防护、检测、响应)安全模型的基础上,详细的论述了内部网行为监管审计系统的设计和实现。
According to the shortcomings of the traditional PDM security management, this paper establishes a workspace-based authorization management model and a DPDM network security model.
本文针对传统PD M安全管理的缺点,建立了基于工作空间的权限管理模型和网络安全模型。
The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
The architecture of the application doesn't match our { storage, network, deployment, security } model
这款产品的体系结构跟我们的{存储,网络,部署,安全}模型不匹配。
However, the Flash Security model doesn't allow local files to access network resources and vice versa.
不过,FlashSecurity模块不允许本地文件访问网络资源,反之亦然。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
Analyzing the essential characteristic of the network security situation assessment, and the reasoning model is proposed.
分析了网络安全态势估计问题的本质特征,构造了网络安全态势推理评估的求解模型。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.
提出了网络安全中基于多传感器数据融合技术的入侵检测模型,并对入侵检测系统的体系结构进行了详细介绍。
This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.
文章提出了一个网络安全防护的动态模型,并基于该模型实现了系统原型。
The Scheme Choice Optimization Model was expounded based on coordinating agent to meet the need of dynamic network information security management.
根据网络动态信息安全管理的需求,提出了协调代理的方案选择优化数学模型。
Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.
通过实例分析证明了算法模型适合全面分析网络安全性和攻击者可能采取的行为方式。
The investigation results show that this model can be used to a comprehensive assessment of network security levels effectively.
研究结果表明,这一模型能有效地对网络安全等级进行综合评价。
Meanwhile, the security network architecture model also has some practical value.
同时,该安全网络架构模型也具有一定的实用价值。
Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.
论文在深入研究网络通信技术和安全技术的基础上,构建了跨区域物流管理系统的框架模型。
Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.
在网络节点之间存在安全依赖关系的前提下,提出了一个基于贝叶斯方法的网络攻击定位和追踪模型。
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm.
文章分析和比较了目前的安全态势评估方法,提出了一种基于日志审计与性能修正算法的网络安全态势评估模型。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
Content filtering in network security is a new subject. This paper founds a complete content filtering model and implements the content filtering model in WWW proxy of TIS.
内容过滤是网络安全领域的新课题,文章建立了一个完整的内容过滤模型,并在TIS的WWW代理服务中实现了此内容过滤模型。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
In addition, we analyse the security of the whole network system integrating the five-layer model of network security mechanism, and put forward the corresponding tactics for every layer.
另外,结合网络安全机制五层模型对整体网络系统的安全进行分析,并针对各层的安全性提出相应的策略。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
应用推荐