At first, the paper fully expatiates the basic viewpoint of networks security, dynamic security model of P2DR, and the basic concept and classification of instruction detection.
论文首先全面阐述了网络安全的基本观点、P2DR的动态安全模型和入侵检测的基本概念及分类。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
A universal security framework based on MABAN is designed according to an security standard of active networks security working group (ANSWG), which can protect the resource of an node effectively.
设计了一个通用的基于移动代理的主动网络安全框架,其符合主动网络安全工作组提出的主动网络的安全规范,能有效地保护主动结点的资源。
Security firm MacAfee recently found that eight out of 10 countries around the world had had critical networks targeted by hackers during 2010.
安全公司麦咖啡最近发现在2010年世界上十个国家中有八个的重要网络收到了黑客的攻击。
They want a gateway device that can translate security tokens from whatever format the client wants to use into an LTPA token for consumption within their own networks.
它们需要一种网关设备,该网关设备可以将安全令牌从客户端希望使用的格式转换为在自已网络中使用的ltpa令牌。
Across the core defence networks there were an average of over a million security alerts every day.
核心防御网络上出现的安全警报次数,平均每天多达一百多万次。
Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.
有些人认为云比许多私有网络要安全,另一些人则认为云计算可能敞开了更多的安全漏洞。
As more and more people started using their unique devices to access corporate networks, companies had to worry about security as well as support for multiple devices.
随着越来越多的人开始使用其独特的设备来访问企业网络,公司不得不开始担心起对多种设备的支持以及安全问题来。
The Center will be a testing ground for everything from intelligent traffic systems to next-generation wireless networks and smart-grid cyber security systems.
中心城将会成为各种新发明——从智能交通系统到新一代无线网络技术以及智能电网网络安全系统——的试验基地。
Apple recommends splitting the bands into two separate networks, naming them differently and making sure that both networks use the same type of security (WEP, WPA, or WPA2).
苹果公司建议将两种频段信号分开成为两个命名不同的网络,并且确保使用相同的安全设置(WEP、WPA或WPA2)。
Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.
对虚拟机之间通信所用的内部虚拟网络的控制不够明确,难以实施安全策略。
Just as telephones used to be differentiated from PCs, servers, and networks, so did security and alarm systems used to be viewed as wholly separate from it.
正如电话曾与个人电脑、服务器以及网络有所不同,安全及报警系统也被视为与IT完全不同。
While this bypasses the previous limitation, it introduces a security breach in case you want to build segregated networks.
虽然这个方法不会出现前面的限制问题,但是如果您希望创建分隔的网络,那么它会造成一个安全漏洞。
The way that we assemble complicated networks of computers until recently hasn't been done at all with security in mind except in a cursory way, and that's the fundamental problem.
直到最近还,我们在安装电脑网络时,没有一点安全意识,都是敷衍了事,那才是根本问题所在。
Apparently some TV, radio links and even security networks are transmitting signals where they are not supposed to be, messing with the satellite's sensitive measurements.
显然一些电视、无线链路以及甚至一些加密网络都在使用不该使用的信号频率进行传输,这就扰乱了卫星敏感的探测器。
And in India, there are worries that Huawei networks could pose security risks.
在印度,也有许多人担心华为会引起安全问题。
The Army is undertaking the upgrades to ensure a seamless interface with existing networks and to provide extensive security and business continuity.
美国陆军正实施升级计划,把现有网络的无缝接口,提升保密性和业务连续性。
Further, mobile devices can now bypass the telephone company network and connect directly with corporate networks through Wi-Fi both for speed and security.
还有,移动设备现在可以越过电话公司的网络直接通过Wi - Fi访问企业网络,这保证了速度和安全。
Despoof is another security tool you can use in detecting spoofed packets used to carry your Ajax applications across networks.
Despoof是另一种检测欺骗数据包的安全工具,这些欺骗数据包能够跨网络传送ajax应用程序。
This article helps you do some planning ahead to help improve the security of your Ajax applications, whether they're located on servers, client-side, or networks.
本文帮助您提前进行一些规划,以改善服务器、客户端或网络中的Ajax应用程序的安全性。
Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.
如果网络级的安全控制在IaaS网络基础设施中无效,就会出现在虚拟化网络中基于网络的控制不足。
My research areas include, but are not limited to, databases, data mining, security, social networks, Internet applications and some mathematics.
我应该会在2010年毕业。我的研究领域包括:数据库、数据挖掘、安全、社会网络、互联网应用以及数学和其他。
Stuxnet has been spotted on computer networks for nearly two years, but the world's top computer security experts have yet to pinpoint exactly who created it, or why.
Stuxnet在电脑网络上仅仅在两年前被发现,但是世界上最顶尖的电脑安全专家依然无法准确地找出谁制造了这种病毒,也无法找出制造它的原因。
For security, WLAN's wired equivalent Privacy (WEP) encryption mechanism provides a level of security equivalent to wired networks.
出于安全性考虑,WLAN的WiredEquivalentPrivacy (WEP)加密机制提供与有线网络相同的安全级别。
For security, WLAN's wired equivalent Privacy (WEP) encryption mechanism provides a level of security equivalent to wired networks.
出于安全性考虑,WLAN的WiredEquivalentPrivacy (WEP)加密机制提供与有线网络相同的安全级别。
应用推荐