• In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式

    youdao

  • In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定