• V2C is applied on integrated network defense framework successfully.

    V2C成功地运用于网络集成防御框架

    youdao

  • Therefore, the Network Defense System (NAD) becoming new marketplace hot spot on self's own initiative.

    因此网络主动防御系统(NAD)成为市场热点

    youdao

  • According to the characteristics of network counterwork, discussed methods of network attack and network defense.

    针对网络对抗特点探讨了网络攻击手段以及网络防御手段。

    youdao

  • Hence, the research on integrated network defense and intrusion detection system is critical to network protection.

    因此研究网络集成防御入侵检测技术网络防御技术有着重要意义。

    youdao

  • Interaction is a new-fashioned network defense strategy, interaction model is footstone of intrusion protection system.

    联动一种新型网络防护策略,联动模型入侵防御体系基石

    youdao

  • The contract includes network operations and security, computer network defense, security life cycle management, and identity management, the Defense Department said.

    国防部合同内容包括网络运行安全计算机网络防御、安全的全寿命管理以及识别管理等。

    youdao

  • The contract covers a wide range of network management services, including network defense, intrusion detection and analysis, remedies and spectrum network management.

    合同覆盖多种网络管理服务包括网络防御入侵探测分析救援频谱网络管理。

    youdao

  • Network trap, which protects the valuable resource of information by guiding the attacker to imitative and illusive information, is an available makeup of traditional network defense.

    网络诱骗技术传统网络防御手段有效补充通过将网络攻击者引向伪造的、虚假信息资源达到保护网络中真正有价值信息资源的目的。

    youdao

  • In computer field in the nowadays, the network safety is one of the most popular problem, but that the network defense on self's own initiative is that the network safety is important one ring then.

    当今计算机领域网络安全热门课题之一网络主动防御是网络安全重要

    youdao

  • The simulation model of network defense effect evaluated by intelligence, which is comprehensive evaluated by combining the theories of immunity and neural networks, is modeled based on the tactic.

    基础结合神经网络理论,建立基于免疫神经网络综合评判智能评判网络防御效果仿真模型,根据该模型可以对网元的网络防御效果进行定性化计算研究。

    youdao

  • The Internet had its origins in a 1969 U.S. Defense Department computer network called ARPAnet, which stood for Advanced Research Project Agency.

    互联网最早起源于1969年美国国防部电脑网络被称为阿帕网代表高级研究项目管理局

    youdao

  • DARPA officials plan to use the cyber range to test technology for the Global Information Grid, the Defense Department's network for warfighters and other personnel.

    DARPA官员计划网络范围全球信息栅格国防部作战人员其他人员网络测试技术

    youdao

  • The Skynet technology formed a seamless network and effectively removed humans from strategic defense.

    天网技术组成了一个无缝网络能有效地人类从通过战略防御清除

    youdao

  • CCS will monitor network activity and support defense operations in the event of an attack on Air Force networks.

    CCS监测网络活动支持针对网络攻击事件防卫行动

    youdao

  • Defense-in-depth must be considered early in the design phase of the development process, and must be an integral consideration in all technical decision-making associated with the network.

    防御纵深必须考虑开发过程设计阶段,必须在所有技术决策不可或缺考虑因素网络相关

    youdao

  • Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.

    如何辨别防御攻击增强网络安全已成为网络运营商技术管理人员甚至普通网络用户研究问题

    youdao

  • Coal River Mountain Watch is supported by the Sierra Club, the Rainforest Action Network, the National Resources Defense Council and other environmental groups.

    CoalRiver看护者”组织得到塞拉俱乐部热带雨林行动网络美国国家资源保卫委员会其他的环保组织的支持。

    youdao

  • Attack and defense in network are constantly conflicting and contradictory, but are also related to each other and even complementary to each other.

    网络攻击防御始终对立矛盾的又是相成、互相联系的。

    youdao

  • It was called Arpanet, for Advanced Research Projects Agency Network, and was developed by scientists in the US Defense Department.

    当时阿帕网(Arpanet,取自高级研究计划署网络advance ResearchProjectsAgency net work),美国国防部科学家们研发而成

    youdao

  • Therefore, some active network security defense methods and counterattack methods need to be researched.

    因此需要研究一些积极主动网络安全防御手段反击手段。

    youdao

  • This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.

    文章提出了一个网络安全防护动态模型,并基于模型实现了系统原型

    youdao

  • Complementing the purchase and development of these new systems are improvements in China's national air defense network, which, since 2007, spans the entire country.

    增加这些系统采购研发中国国土防空网络方面的进步后者2007年以来已经遍布全国

    youdao

  • Agency of the U. s. Department of Defense. This international network allows its members to use the facilities and access the data from dozens of different computers.

    美国国防部高级研究计划局建立计算机网这个国际网允许成员使用设备大批不同计算机存取数据

    youdao

  • In response to these security issues, describes how to build a P2P network security defense system.

    针对这些安全问题介绍了如何构建P 2 P网络的安全防御体系。

    youdao

  • And explains the application of the active defense system and the passive defense system in network security.

    阐述主动防御系统被动防御系统网络安全中的应用

    youdao

  • Through analyzing the hidden dangers and faced threats of network security in digital library, this paper advances some network security defense measures for university digital library.

    通过分析数字图书馆网络安全隐患面临威胁提出高校数字图书馆网络安全防御措施

    youdao

  • This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.

    该文计算机网络安全防御措施展开指出常见网络攻击及其防御措施。

    youdao

  • This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.

    该文计算机网络安全防御措施展开指出常见网络攻击及其防御措施。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定