intrusion detection

英 [ɪnˈtruːʒn dɪˈtekʃn] 美 [ɪnˈtruːʒn dɪˈtekʃn]

网络  入侵检测; 入侵侦测; 入侵检测系统; 入侵检测技术; 入侵探测

电力



双语例句

  1. Then there are a number of intrusion detection systems ( IDS) like the very popular Snort and logsnorter.
    还有很多入侵检测系统(IDS),例如非常流行的Snort和logsnorter。
  2. It's an intrusion detection system& not just a tool.
    它是一种入侵检测系统&而不仅仅是工具。
  3. Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
    入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
  4. Distributed intrusion detection systems ( DIDS) have many advantages such as scalability, subversion resistance.
    分布式入侵检测系统有许多优点,如可测量性和抗破坏性。
  5. Intrusion Detection System is a tool which is used to detect the intrusions to network system.
    入侵检测系统是一种检测网络入侵行为的工具。
  6. For the IPv6 Network Intrusion Detection System for Analysis and Research
    针对IPv6网络下入侵检测系统的分析和研究
  7. Research on Application on the Sequence Compare Algorithm in the Intrusion Detection System
    序列比较算法在入侵检测系统的研究与应用
  8. Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.
    入侵检测技术可以在网络系统受到损害前对入侵行为做出拦截和响应。
  9. Research on hierarchical alarm processing model in intrusion detection system
    入侵检测系统中分层报警处理模型的研究
  10. Study of Intrusion Detection System Based on Adaptive Model
    基于自适应性模型的入侵检测系统研究
  11. Research and Design of Intrusion Detection System Based on Mixed Model
    基于混合模式的入侵检测系统研究与设计
  12. Intrusion Detection System Research and Implementation Based on Intelligence
    基于智能的入侵检测系统研究与实现
  13. Red-M and Madge Networks, Red-Alert Pro and WLAN Probe WLAN intrusion detection devices.
    红色-M和马奇网络,红色警报专业和无线探头无线局域网入侵检测设备。
  14. The paper also discusses a new intrusion detection technology: protocol analysis.
    本文接下来讨论了一种新的检测技术&协议分析。
  15. The method is based on the intrusion detection model and the entropy is used as the criterion.
    该方法以入侵检测模型为基础,信息熵为准则。
  16. Study of Intrusion Detection System Based on the Data Preprocessing
    基于数据预处理的入侵检测系统研究
  17. Among the methods of intrusion detection with clustering, how to make clustering effectively is a critical problem.
    在利用聚类进行入侵检测的方法中,有效地进行聚类是关键。
  18. Abstract This paper put forward a new intrusion detection method based on neural network ensemble.
    提出一种新的基于神经网络集成的入侵检测方法。
  19. Intrusion Detection Based on Protocol Analysis and Decision Tree
    基于协议分析和决策树的入侵检测研究
  20. This design can directly be applied to intrusion detection system or products and it can expand dynamically.
    该设计方法能够直接融入现有的分布式入侵检测系统或产品中,并且具有动态可扩展性。
  21. The Research and Design of Intrusion Detection System Based on PCA and Improved BP Neural Network
    基于PCA和改进BP神经网络的入侵检测系统研究与设计
  22. The impact of DIPS on database system and its intrusion detection and prevention is tested and analyzed.
    这些工作大大提高了数据库入侵防护系统的实用性,为进一步的研究工作奠定了良好的基础。
  23. This paper put forward a new piece of intrusion detection algorithm which combines dynamic clonal selection and immune network.
    提出了一种动态克隆选择算法和免疫网络相结合的新入侵检测算法。
  24. The delay problem of intrusion detection response was studied.
    研究了入侵检测响应中的延迟问题。
  25. A novel approach for intrusion detection based on intelligent neural networks is proposed.
    提出了一个基于智能神经网络的网络入侵检测新方法。
  26. Research and Improvement on BM Pattern Matching Algorithm for Intrusion Detection
    入侵检测中BM模式匹配算法的研究和改进
  27. At first, the procreant background and the development process of intrusion detection system was introduced.
    首先介绍了入侵检测系统的产生背景,以及入侵检测系统的发展历程。
  28. Theory and experiment show that this method has better ability in intrusion detection.
    理论和实验表明该方法具有较好的检测能力。
  29. Bidirectional data reduction based on PCA and combined SSGA in intrusion detection system
    入侵检测系统中基于PCA和C-SSGA的双向数据压缩
  30. Research and improvement of Apriori Algorithm in intrusion detection
    入侵检测中Apriori算法的研究与改进