intrusion detection造句
1、Applying Data Mining to Intrusion Detection Technology
数据挖掘技术在网络攻击检测中的应用
2、Intrusion detection and audits of security logs.
入侵检测以及安全日志审核。
3、Study on Crucial Techniques of Intrusion Detection Based on Data Mining
基于数据挖掘的入侵检测关键技术研究
4、Secondly, unlabeled intrusion detection technology may product relatively high false alarm rate.
其次,针对一般无标记异常检测技术存在较高误报率的问题。
5、Study of Intrusion Detection Based on ECA Rule
基于ECA规则的入侵检测研究
6、Then there are a number of intrusion detection systems like the very popular snort and logsnorter.
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。
7、Adaptive model for intrusion detection of computer network
计算机网络自适应入侵检测模型研究
8、You know that Snort is an intrusion detection system, but how does it detect intrusion?
您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
9、It's an intrusion detection system — not just a tool.
它是一种入侵检测系统——而不仅仅是工具。
10、Designing of Intrusion Detection System Based on Java
基于Java语言的入侵检测系统设计
11、Research and Design of Distributed Intrusion Detection System Based on DCN
DCN网络分布式入侵检测系统研究和设计
12、Finally, an intrusion detection system model based on hybrid neural network is presented.
最后,提出了一种基于混合神经网络的入侵检测系统模型。
13、Snort: an intrusion detection tool.
Snort:一种入侵检测工具。
14、Pattern matching algorithm is an important algorithm, used by most of Intrusion Detection System.
模式匹配算法是入侵检测系统中使用较多的一种重要算法。
15、The thesis researches and designs the method of intrusion detection based specification.
本文研究并设计了一种基于规范的入侵检测方法。
16、Building Intrusion Detection Model Based on Data Mining
基于数据发掘的入侵检测建模
17、Study of Intrusion Detection System Based on Adaptive Model
基于自适应性模型的入侵检测系统研究
18、Intrusion detection - Alarm control and indicating equipment - Requirements.
侵入检测。报警控制和指示设备。要求。
19、Research and Deployment of Distributed Intrusion Detection System
分布式入侵检测系统的研究与部署
20、So what is an intrusion detection system, anyway?
那么究竟什么是入侵检测系统?
21、Intrusion detection - Very-high frequency motion detectors - Specific standard.
侵入检测。甚高频运转检测器。专用标准。
22、Intrusion Detection Research Based on Alarm Information of IDS
基于IDS报警信息源的入侵检测
23、Research on Intrusion Detection Based on Markov Chain
基于马尔柯夫链的入侵检测方法研究
24、Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可变通常是安全或者入侵检测工作的一部分。
25、Research on Network Intrusion Detection Based on Data Mining
基于数据挖掘的网络入侵检测研究
26、A note on intrusion detection in Telnet
针对Telnet协议的入侵检测研究(英文)
27、A Model of Intrusion Detection Based on Natural Immune and System Bug
基于生物免疫机理和系统隐患的入侵检测系统
28、Pattern matching algorithm is the important part of the signature-based intrusion detection engine.
模式匹配算法是基于特征的入侵检测引擎中的重要部分。
29、Intrusion detection - Active infra-red detectors - Specific standard.
侵入检测。主动式红外线检测器。专用标准。
30、Network Intrusion Detection Strategies Based on MIB-Ⅱ
基于MIB-Ⅱ的网络安全入侵检测策略
intrusion detection翻译
【电】 侵入探测 详情猜你喜欢
phase造句
1、Oviposition is the important life phasgarbage collector造句
1、If the garbage collector discovers ansesame造句
1、A good degree can be an open sesame tokebab造句
1、Nobody linked them to the "doner murdeensign造句
1、He then waved the tattered ensign abovjarring造句
1、Ultimately, it results in a jarring coreference value造句
1、This is a great reference value of thenatriuretic造句
1、Plasma atrial natriuretic factor concepars造句
1、The dangerous type chronic otitis medisubminiature造句
1、Since the relay was a subminiature typfirst-born造句
1、With April's first-born flowers, and acruising造句
1、Climb straight on course to cruising lout of alignment造句
1、Binocular lenses that are out of alignemergent造句
1、Execute emergent repairs of moulds.生产模MDF造句
1、Study on the Stability and Modificatiogive free rein造句
1、Give free rein to your imagination.你可以boldness造句
1、The boldness of the line indicates theamnio造句
1、And some suggest that with further finrelative to造句
1、As a result, its activities are shiftetop view造句
1、Top view of countersunk slotted screw.