• There are many intrusion detection systems deployed in parts of the world.

    不少著名入侵检测系统也得到广泛的实际应用

    youdao

  • Analyzed and compared the typical intrusion detection systems and intrusion means.

    典型入侵检测系统入侵方式进行了分析比较

    youdao

  • Intrusion detection (ID) techniques are important to intrusion detection systems (IDS).

    入侵检测技术入侵检测系统(IDS)的重要内容

    youdao

  • Traditionally, intrusion detection systems detect intrusions at the operating system(OS)level.

    传统入侵检测系统方法是操作系统检测入侵。

    youdao

  • Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.

    还有很多入侵检测系统(IDS),例如非常流行snortlogsnorter

    youdao

  • In the intrusion detection systems, matching speed of the string matching algorithm is very important.

    入侵检测系统当中,匹配算法运行速度至关重要的。

    youdao

  • Intrusion detection systems, or IDSs, have become an important component in the Security Officer's toolbox.

    入侵检测系统简称IDS,已经成为安全办公产品中的一个重要组成部分

    youdao

  • Anomaly detection ACTS as one of the important directions of research on Intrusion detection Systems (IDSs).

    异常检测目前入侵检测系统(IDS)研究主要方向

    youdao

  • Distributed intrusion detection systems( DIDS) have many advantages such as scalability, subversion resistance.

    分布式入侵检测系统许多优点可测量性和破坏性。

    youdao

  • Therefore, research on collaboration between honeypot and intrusion detection systems is a problem worthy of study.

    因此蜜罐入侵检测系统之间协作一个非常值得研究问题

    youdao

  • Adaptive model is a detecting model which is automatically built of intrusion detection systems based on data-mining.

    适应性模型一种自动建立基于数据挖掘入侵检测系统检测模型。

    youdao

  • Anomaly detection techniques are seldom employed in the leading commercial intrusion detection systems for its own fake.

    异常检测由于自身的原因很难商业入侵检测系统中得到应用

    youdao

  • The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.

    作者很快得出两个重要主题入侵检测系统IDS旁路过滤

    youdao

  • As the second line of defense for computer and network systems, intrusion detection systems (IDSs) have been deployed increasingly wider.

    作为保护计算机网络系统第二防线入侵检测系统的应用越来越广泛

    youdao

  • This mechanism has a perfect scalability and is well fitted to the characteristic of large-scale distributed intrusion detection systems.

    文中提出数据融合机制具有好的扩展性非常适合大规模分布式网络环境特点

    youdao

  • Based on the framework of network intrusion detection systems based on data mining, this paper devises an analyzer model of unsupervised learning.

    本文基于数据挖掘网络入侵检测系统框架基础设计了一个无导师学习分析器模型

    youdao

  • Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks.

    现存入侵检测系统缺乏从先前所观测到进攻进行概括并检测已知攻击的细微变化能力

    youdao

  • As one of the important points of information security safeguard system, more and more intrusion detection systems have been used to protect networks.

    入侵检测系统作为信息安全保障体系不可或缺重要环节,被更多地用于安全防护。

    youdao

  • The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.

    系统入侵检测系统主机系统等多数据源主动收集数字证据通过完整性算法保证数字证据传输和存贮过程中的完整性。

    youdao

  • In addition, CSC will plan, coordinate, analyze and report on the results of managed network intrusion detection systems and intrusion prevention systems.

    此外CSC公司规划协调分析报告网络入侵检测系统和入侵防御系统管理结果

    youdao

  • Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    youdao

  • Based on D-S evidence theory in data fusion technology, this paper applies it to distributed intrusion detection systems and gives a network intrusion early warning model.

    本文数据融合技术中的D -S证据理论为基础,将其运用分布式入侵检测系统中,提出了基于D - S证据理论的网络入侵预警模型。

    youdao

  • With the frequent occurrences of network oriented intrusion, intrusion detection systems(IDS)have gained more and more recognition and application in network environments.

    随着网络入侵事件日益增多,入侵检测系统IDS越来越广泛应用网络环境中

    youdao

  • In the artificial immune based intrusion detection systems, mature detectors complete the tolerance and generation process mainly by negative selection algorithm currently.

    目前基于人工免疫入侵检测系统中,成熟检测器耐受生成过程主要采用否定选择算法实现。

    youdao

  • This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.

    该文分析基于主机基于网络入侵检测系统特点的基础上,提出一种电子商务安全审计系统的设计。

    youdao

  • After discussing the present intrusion detection systems and methods and analyzing their defects, the author presented SNMP agent system based on intrusion status detection.

    分析现有入侵检测方法及其缺陷的基础上,提出了一种基于状态机的入侵检测的SNMP代理方案

    youdao

  • Intrusion detection systems constantly monitor sensitive operating system and browser areas, alerting you with clear information the instant suspicious activity is detected.

    入侵检测系统持续监测敏感操作系统浏览器领域警戒明确信息即时发现可疑活动

    youdao

  • A few useful mechanisms of biological immune system are applied for intrusion detection systems, which makes it possible to initiatively defense a variety of network attacks.

    机体免疫系统许多有益特性应用入侵检测系统使能够主动地防御各种各样的网络攻击。

    youdao

  • The dataset evaluation methodology is a feasible and effective way to evaluate the performance of intrusion detection systems. The dataset contains background traffic and attack traffic.

    利用评测数据入侵检测系统进行评测目前可行并且有效评估手段,数据集包括背景流量攻击流量两部分。

    youdao

  • With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems (IDS) can't any longer meet the need of security.

    随着网络攻击手段日益复杂化多样化自动化传统入侵检测系统(IDS)己不能满足安全需求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定