intrusion detection造句

1、Applying Data Mining to Intrusion Detection Technology
数据挖掘技术网络攻击检测中的应用

2、Intrusion detection and audits of security logs.
入侵检测以及安全日志审核。

3、Study on Crucial Techniques of Intrusion Detection Based on Data Mining
基于数据挖掘的入侵检测关键技术研究

4、Secondly, unlabeled intrusion detection technology may product relatively high false alarm rate.
其次,针对一般无标记异常检测技术存在较高误报率的问题

5、Study of Intrusion Detection Based on ECA Rule
基于ECA规则的入侵检测研究

6、Then there are a number of intrusion detection systems like the very popular snort and logsnorter.
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。

7、Adaptive model for intrusion detection of computer network
计算机网络自适应入侵检测模型研究

8、You know that Snort is an intrusion detection system, but how does it detect intrusion?
知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?

9、It's an intrusion detection system — not just a tool.
它是一种入侵检测系统——而不仅仅是工具

10、Designing of Intrusion Detection System Based on Java
基于Java语言的入侵检测系统设计

11、Research and Design of Distributed Intrusion Detection System Based on DCN
DCN网络分布式入侵检测系统研究和设计

12、Finally, an intrusion detection system model based on hybrid neural network is presented.
最后,提出了一种基于混合神经网络的入侵检测系统模型。

13、Snort: an intrusion detection tool.
Snort:一种入侵检测工具。

14、Pattern matching algorithm is an important algorithm, used by most of Intrusion Detection System.
模式匹配算法是入侵检测系统中使用较多的一种重要算法。

15、The thesis researches and designs the method of intrusion detection based specification.
本文研究并设计了一种基于规范的入侵检测方法

16、Building Intrusion Detection Model Based on Data Mining
基于数据发掘的入侵检测建模

17、Study of Intrusion Detection System Based on Adaptive Model
基于自适应性模型的入侵检测系统研究

18、Intrusion detection - Alarm control and indicating equipment - Requirements.
侵入检测。报警控制指示设备。要求

19、Research and Deployment of Distributed Intrusion Detection System
分布式入侵检测系统的研究与部署

20、So what is an intrusion detection system, anyway?
那么究竟什么是入侵检测系统?

21、Intrusion detection - Very-high frequency motion detectors - Specific standard.
侵入检测。甚高频运转检测器。专用标准

22、Intrusion Detection Research Based on Alarm Information of IDS
基于IDS报警信息源的入侵检测

23、Research on Intrusion Detection Based on Markov Chain
基于马尔柯夫链的入侵检测方法研究

24、Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可变通常是安全或者入侵检测工作的一部分

25、Research on Network Intrusion Detection Based on Data Mining
基于数据挖掘的网络入侵检测研究

26、A note on intrusion detection in Telnet
针对Telnet协议的入侵检测研究(英文)

27、A Model of Intrusion Detection Based on Natural Immune and System Bug
基于生物免疫机理和系统隐患的入侵检测系统

28、Pattern matching algorithm is the important part of the signature-based intrusion detection engine.
模式匹配算法是基于特征的入侵检测引擎中的重要部分。

29、Intrusion detection - Active infra-red detectors - Specific standard.
侵入检测。主动式红外线检测器。专用标准。

30、Network Intrusion Detection Strategies Based on MIB-Ⅱ
基于MIB-Ⅱ的网络安全入侵检测策略

intrusion detection翻译

【电】 侵入探测 详情
0
纠错/补充

猜你喜欢

单词推荐

intrusion detection造句 单词乎
m.dancihu.com