go top

intrusion response

  • 攻击响应,入侵响应

网络释义专业释义

  入侵响应

入侵响应Intrusion Response)就是在发现或检测到入侵后针对入侵所采取的措施和行动, 这些行动和措施是为了在发生入侵的情况下确保被保护目标的机密性、完整性...

基于86个网页-相关网页

  侵扰反应

... intrusion of personal space 个人空间的侵入 intrusion response 侵扰反应 intrusion 侵入 ...

基于66个网页-相关网页

短语

Intrusion Response System 入侵响应系统

intrusion response systems 入侵响应系统

Proactive Intrusion Response 先应式入侵响应

automated intrusion response 自动入侵响应

Cooperative Intrusion Response 协同入侵响应

Dynamic Intrusion Response System 方案就叫作动态入侵检测响应系统

intrusion response decision-making 入侵响应决策

 更多收起网络短语
  • 入侵响应 - 引用次数:78

    Great emphasis was put in key modules such as Protocols Processing module, Pattern-matching module, Log module and Intrusion Response module.

    针对几个重点模块:协议处理模块、攻击特征模式匹配模块、日志记录模块和入侵响应模块做了较为详细的说明。

    参考来源 - 基于模式匹配的入侵检测系统
  • 入侵响应 - 引用次数:7

    An example is given to give more information of the working process of the intrusion response system at last.

    为了更清楚地说明入侵响应系统的工作过程,本部分最后通过一个应用实例分析了系统的有效性。

    参考来源 - 基于AODV的移动Ad Hoc网络入侵响应研究
  • 侵扰反应

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句权威例句

  • The model gives the theoretical and methodological support for intrusion response.

    形式化模型入侵决策提供理论方法支撑

    youdao

  • To responding intrusion fast and timely, many automatic response technology is on the research for the intrusion response.

    为了能够快速及时响应各种入侵,人们研究多种自动响应技术响应入侵。

    youdao

  • With a large number of network attacks, the automated intrusion response system can take timely countermeasures to stop attacks and reduce the loss of system.

    面对大量网络攻击事件,自动入侵响应系统能够及时采取响应措施阻止攻击延续减小系统损失

    youdao

更多双语例句
  • That they have not hired the right leadership for security, implemented the right program, and then taken the correct tactical steps (for Gawker: exercising an incident response plan, implementing password complexity and use requirements, having an intrusion management strategy, having a data breach plan) in the context of an overall information security strategy.

    FORBES: Discussing Gawker's Breach With Founder Nick Denton

  • Intrusion detection, capable of spotting zero day exploits, must be deployed to audit and test the recognition and response capabilities of your corporate security defences.

    FORBES: Written by Anthony Haywood

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定