• In addition, this model USES the protocol analysis technology.

    模型采用协议分析技术

    youdao

  • The network protocol analysis is an essential technique in network intrusion detection.

    网络协议分析网络入侵检测中的一项关键技术

    youdao

  • The application of the protocol analysis technology in IDS is also discussed in this paper.

    协议分析技术IDS中的应用进行讨论。

    youdao

  • In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.

    事实证明,空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • A new method of VHF channel access protocol analysis based on semi-Markov model is presented in this paper.

    本文提出了基于半马尔可夫模型VHF信道访问协议分析方法

    youdao

  • Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.

    空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • It deeply probes into the packet capture module, packet filter module and protocol analysis module of a IDS.

    设计了一个入侵检测系统基本框架,深入探讨了其中的捕获机制、包过滤机制协议分析机制。

    youdao

  • One of the most commonly used methods for qualitative research in educational psychology is protocol analysis.

    教育心理学常用定性研究方法协议分析法

    youdao

  • The performance of 1394 emluator driver is analyzed and summarized with 1394 protocol analysis device in the end.

    最后结合1394协议分析仪对该驱动的性进行了分析总结

    youdao

  • Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.

    本文主要讨论了虚拟专用网络系统协议分析模块异步加密模式SADB实现。

    youdao

  • The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.

    整个设计中作者分析实现网络数据包捕获技术协议分析技术和数据库存储。

    youdao

  • Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.

    协议分析目前多数入侵检测系统所采用技术用以弥补单纯模式匹配不足

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • Compared with the original concept, the new approach is more formal and can make protocol analysis easier both by hand and automatically.

    原有技术相比方法更为形式化协议分析人员可以方便地进行手动分析,并且更有利于协议分析自动化工具的实现。

    youdao

  • These provide a combination of both capturing and decoding content for you, often performing the bulk of the protocol analysis process for you.

    这些工具能够帮捕捉解码数据包,通常也能为您执行大多数协议分析

    youdao

  • The intelligent E-mail processing, which is based on the packet filtering and protocol analysis, makes the encryption and signature intelligent.

    智能邮件信息处理基于数据包过滤协议分析处理技术,实现邮件加密签名智能化

    youdao

  • In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.

    本文揭示了模式匹配技术弱点分析一种新的、有效检测方法协议分析技术

    youdao

  • This paper introduced one method called protocol analysis due to the high false acceptance rate and high alarm rate caused by pattern match algorithm.

    针对模式匹配算法带来漏报率误报引入了协议分析方法

    youdao

  • The study used the protocol analysis showed that the framework is a kind of knowledge structure and an effective heuristic strategy of problem solving.

    本文采用口语报告分析所进行研究表明框架问题求解方面的知识结构有效启发式求解策略

    youdao

  • It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.

    分析引擎使用协议分析模式匹配结合检测方法以及改进了的匹配算法提高检测速度

    youdao

  • Computer network course is the key lesson in relative speciality of higher schools, and protocol analysis is a main link in the teaching system of computer.

    计算机网络基础课程高等院校计算机相关专业重点课程,网络协议分析是计算机网络教学体系当中的一个重要环节

    youdao

  • And according to Protocol Analysis detection, it can flag the anomaly traffic, and detect some attack variations, and resist attackers' obfuscation attempts.

    利用协议分析技术发现网络中的异常报文,标识出未知攻击,发现攻击者使用的躲避技术变种攻击。

    youdao

  • It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.

    具有实时数据流量分析日志ip网络数据包能力,能够进行协议分析,是网络安全领域一个新兴热点

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • The detailed analysis of data packet in TCP/IP protocol suite is given out. On the basis of it, a layered protocol analysis module is designed and realized in this paper.

    论文对TCP/IP协议数据封装过程进行详细分析,并此基础上设计实现了一个分层的协议分析模块

    youdao

  • IIC bus protocol analysis on the basis of a detailed description in the text adopted by the IIC module DM642 video decoder chip register configuration, calibration process.

    分析IIC总线协议基础上,文中详细叙述了DM 642通过IIC模块视频编解码芯片寄存器进行配置校验的流程。

    youdao

  • By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.

    通过分析各种入侵检测技术我们入侵检测引擎的实现过程中采用了协议分析命令解析以及分析统计方法

    youdao

  • Participation in the overall program requirement analysis, monitoring center, protocol analysis module, flow filtration module, intrusion detection module analysis and design.

    参与整体方案需求分析进行监控中心协议分析模块过滤模块、入侵检测模块的分析设计

    youdao

  • Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.

    吉姆团队采取了三种不同分析方法——意图治疗分析改良的意图治疗分析,以及居前协议分析。

    youdao

  • Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.

    吉姆团队采取了三种不同分析方法——意图治疗分析改良的意图治疗分析,以及居前协议分析。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定