• This paper presents an IDS model based on mobile agents, which adopts the research results from two fields: the distributed IDS and the mobile agent(MA).

    本文提出了一种基于移动代理IDS模型综合两个领域研究成果分布式IDS移动代理MA)。

    youdao

  • In this paper, the characteristics of MANET are analyzed, the requirements of its intrusion detection system (IDS) are discussed, and an IDS model for MANET is proposed.

    文章分析了MANET特点以及入侵检测系统(IDS)的要求提出了种MANET的IDS模型

    youdao

  • The article proposed a distributed IDS model, whose data collection unit was composed of classic IDS and backend components used to convert alert information to IDMEF format;

    提出一种分布式IDS系统模型采集单元基于已有集中式IDS,仅增加后台信息转换组件,将其告警信息转换为标准IDMEF格式;

    youdao

  • Both the DB2 and IDS security model consist of two main components: authentication and authorization.

    DB2IDS安全模型两个主要组件组成身份验证授权

    youdao

  • It adds a listener to the button, then puts them both into HTML elements whose document object model (DOM) IDs match the strings passed to RootPanel.get .

    按钮添加侦听程序,然后按钮和标签放入文档对象模型(DOM)ID匹配传递给RootPanel . get的字符串HTML元素

    youdao

  • We. have named the disorder as"Intellectual Disturbance Syndrome in Middle School Student"(IDS)on the basis of Biological-psychosocial medical model.

    根据生物—心理—社会医学模式,我们把该病命名中学生智力障碍综合征”。

    youdao

  • Based on this thought, we propose an IDS alert correlation model based on description logics.

    思想基础上,进一步提出基于描述逻辑IDS告警关联模型

    youdao

  • To decrease the false alarm rate and improve hit rate of IDS, an improved BP algorithm was applied to an ID model.

    为了降低入侵检测系统提高检测率,在入侵检测模型中应用一种改进BP算法

    youdao

  • After reasoning the feasibility of adopting IDS into dynamic forensics, a dynamic forensics system model is presented and expounded in detail.

    论证入侵检测系统用于动态取证可行性之后,给出了动态取证系统模型进行详尽的阐述。

    youdao

  • The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.

    文中提出了一种入侵检测取证系统模型考虑入侵检测计算机取证技术结合在一起。

    youdao

  • This model researches fitly the trust relation between user and IDS, and the computing means of the user trust degree is presented on the basis of the user trust model and the principle of IDS.

    模型非常适合用户入侵检测系统信任研究根据用户可信模型入侵检测系统原理提出了用户可信度计算方法

    youdao

  • The model was characterized by correlating and merging alerts of different types of IDS, generating the measures of the security situation, thus constituting the evidence.

    模型特点关联合并不同类型IDS警报产生安全局势措施从而构成证据。

    youdao

  • At last each function module of detection model are designed and analysed briefly, and a simple distributed cooperative IDS is designed and deployed.

    最后模型功能模块进行了设计分析给出了一个简单分布式协同入侵检测系统的设计和配置

    youdao

  • This model has a structure of Agent-Analyzer-Manager with a characteristic of feeble center. This helps improve the self -security of IDS.

    模型采用“代理器-分析器-管理器”结构特点中心的管理方式,可以提高入侵检测系统自身的安全性。

    youdao

  • This paper proves that the model is feasible for intrusion detection and describes the IDS that USES this model to describe net-attacks by CIDF (Common intrusion detection Framework).

    本文论证了应用该模型可行性利用通用入侵检测框架CIDF应用该模型的入侵检测系统进行描述,最后与其它入侵检测模型进行了比较。

    youdao

  • This paper proves that the model is feasible for intrusion detection and describes the IDS that USES this model to describe net-attacks by CIDF (Common intrusion detection Framework).

    本文论证了应用该模型可行性利用通用入侵检测框架CIDF应用该模型的入侵检测系统进行描述,最后与其它入侵检测模型进行了比较。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定