intrusion detection造句
1、Applying Data Mining to Intrusion Detection Technology
數(shù)據(jù)挖掘技術(shù)在網(wǎng)絡(luò)攻擊檢測(cè)中的應(yīng)用
2、Intrusion detection and audits of security logs.
入侵檢測(cè)以及安全日志審核。
3、Study on Crucial Techniques of Intrusion Detection Based on Data Mining
基于數(shù)據(jù)挖掘的入侵檢測(cè)關(guān)鍵技術(shù)研究
4、Secondly, unlabeled intrusion detection technology may product relatively high false alarm rate.
其次,針對(duì)一般無(wú)標(biāo)記異常檢測(cè)技術(shù)存在較高誤報(bào)率的問(wèn)題。
5、Study of Intrusion Detection Based on ECA Rule
基于ECA規(guī)則的入侵檢測(cè)研究
6、Then there are a number of intrusion detection systems like the very popular snort and logsnorter.
還有很多入侵檢測(cè)系統(tǒng)(IDS),例如非常流行的snort和logsnorter。
7、Adaptive model for intrusion detection of computer network
計(jì)算機(jī)網(wǎng)絡(luò)自適應(yīng)入侵檢測(cè)模型研究
8、You know that Snort is an intrusion detection system, but how does it detect intrusion?
您知道Snort是一種入侵檢測(cè)系統(tǒng),但它是如何檢測(cè)入侵的呢?
9、It's an intrusion detection system — not just a tool.
它是一種入侵檢測(cè)系統(tǒng)——而不僅僅是工具。
10、Designing of Intrusion Detection System Based on Java
基于Java語(yǔ)言的入侵檢測(cè)系統(tǒng)設(shè)計(jì)
11、Research and Design of Distributed Intrusion Detection System Based on DCN
DCN網(wǎng)絡(luò)分布式入侵檢測(cè)系統(tǒng)研究和設(shè)計(jì)
12、Finally, an intrusion detection system model based on hybrid neural network is presented.
最后,提出了一種基于混合神經(jīng)網(wǎng)絡(luò)的入侵檢測(cè)系統(tǒng)模型。
13、Snort: an intrusion detection tool.
Snort:一種入侵檢測(cè)工具。
14、Pattern matching algorithm is an important algorithm, used by most of Intrusion Detection System.
模式匹配算法是入侵檢測(cè)系統(tǒng)中使用較多的一種重要算法。
15、The thesis researches and designs the method of intrusion detection based specification.
本文研究并設(shè)計(jì)了一種基于規(guī)范的入侵檢測(cè)方法。
16、Building Intrusion Detection Model Based on Data Mining
基于數(shù)據(jù)發(fā)掘的入侵檢測(cè)建模
17、Study of Intrusion Detection System Based on Adaptive Model
基于自適應(yīng)性模型的入侵檢測(cè)系統(tǒng)研究
18、Intrusion detection - Alarm control and indicating equipment - Requirements.
侵入檢測(cè)。報(bào)警控制和指示設(shè)備。要求。
19、Research and Deployment of Distributed Intrusion Detection System
分布式入侵檢測(cè)系統(tǒng)的研究與部署
20、So what is an intrusion detection system, anyway?
那么究竟什么是入侵檢測(cè)系統(tǒng)?
21、Intrusion detection - Very-high frequency motion detectors - Specific standard.
侵入檢測(cè)。甚高頻運(yùn)轉(zhuǎn)檢測(cè)器。專用標(biāo)準(zhǔn)。
22、Intrusion Detection Research Based on Alarm Information of IDS
基于IDS報(bào)警信息源的入侵檢測(cè)
23、Research on Intrusion Detection Based on Markov Chain
基于馬爾柯夫鏈的入侵檢測(cè)方法研究
24、Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可變通常是安全或者入侵檢測(cè)工作的一部分。
25、Research on Network Intrusion Detection Based on Data Mining
基于數(shù)據(jù)挖掘的網(wǎng)絡(luò)入侵檢測(cè)研究
26、A note on intrusion detection in Telnet
針對(duì)Telnet協(xié)議的入侵檢測(cè)研究(英文)
27、A Model of Intrusion Detection Based on Natural Immune and System Bug
基于生物免疫機(jī)理和系統(tǒng)隱患的入侵檢測(cè)系統(tǒng)
28、Pattern matching algorithm is the important part of the signature-based intrusion detection engine.
模式匹配算法是基于特征的入侵檢測(cè)引擎中的重要部分。
29、Intrusion detection - Active infra-red detectors - Specific standard.
侵入檢測(cè)。主動(dòng)式紅外線檢測(cè)器。專用標(biāo)準(zhǔn)。
30、Network Intrusion Detection Strategies Based on MIB-Ⅱ
基于MIB-Ⅱ的網(wǎng)絡(luò)安全入侵檢測(cè)策略
intrusion detection翻譯
【電】 侵入探測(cè) 詳情

猜你喜歡
- burst out造句
- chronometer造句
- purchasing agent造句
- rear axle造句
- oppressed造句
- osteoclast造句
- outward-bound造句
- remover造句
- salami造句
- surface wave造句
- round造句
- apache造句
- gig造句
- salable造句
- multigrid造句
- gibbon造句
- turtle造句
- it is a shame that造句
- step on造句
- furrowed造句
- shellfish造句
- magnesium carbonate造句
- clinton造句
- mores造句
- anaesthetized造句
- rosehip造句
- gimbal造句
- cylinder造句
- slewing造句
- measurement error造句
- geostrategic造句
- weather forecast造句
- shore造句
- auscultate造句
- wave造句
- sag造句
- gas造句
- homeostatic造句
- unplowed造句