网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Intrusion detection
例句
1) The seven solutions address intrusion detection, crowd control, loitering, standing vehicles, forbidden direction or path of motion, camera triggering, and facility utilization.
2) While the research of unsupervised intrusion detection which take unlabelled data as training samples is attractive and challenging.
3) The performance efficiency of a network intrusion detection system ( NIDS ) is dominated by pattern matching algorithm.
4) An kernel clustering intrusion detection approach based on outlier detection is presented in this paper.
5) Then it analyzes and compares the existing network intrusion detection algorithm based on artificial immune, and improves the linear time detector generating algorithm for the deficiency.
6) In the intrusion detection systems, matching speed of the string matching algorithm is very important.
7) Distributed intrusion detection systems ( DIDS ) have many advantages such as scalability,(http:///intrusion detection.html) subversion resistance.
8) The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.
9) While using the same data collected by intrusion detection sensors, adaptive model is automatically built.
10) Intrusion detection system as a reasonable complement of Firewall can detect real-time computer and network intrusion events.
11) Second, the security detection technology, mainly through intrusion detection technology.
12) Anomaly detection method is one of the main intrusion detection methods.
13) In this paper , the framework of network intrusion detection technology Based unsupervised outlier detection is discussed.
14) Nowadays there are the following shortcomings in intrusion detection products , lack the effectiveness, flexibility, adaptivity.
15) A technique of high - speed network intrusion detection system based on packet sampling theory is proposed.
16) Other application areas include intrusion detection, web log analysis, database access patterns, and so on.
17) An intrusion detection system(IDS) can detect system or network sources in a real time way, find the intruder in time, and prevent legal users' misoperation.
18) This paper proposes a new Support Vector Machine(SVM) for anomaly intrusion detection method based on Latent Semantic Indexing(LSI).
19) It puts forward an improved distribution architecture according to analyzing the anteriority intrusion detection system.
20) This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
21) Intrusion prevention system is a new information security technology which can supply a gap of the firewall and the intrusion detection system in the information security domain.
22) Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS.
23) In this paper, binary tree structure substitutes for linked list structure used in traditional IDS, aiming to better storage of rules and improve pattern matching so as to speed intrusion detection.
24) Flowing and precipitation of the self-purification is applied in the intrusion detection for optimizing the detection model and eliminating the latent intrusion data.
25) Analyzing honey-pot and honey-network system, and researching on application of the honey-pot in the intrusion detection and the response in the military computer network.
26) Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.
27) In this paper, the architecture and the detection principle of adaptive model generation systems are studied, then the adaptive model for intrusion detection of computer network is established.
28) Aiming at the problem of traditional intrusion system, such as high false alert rate, alert torrent, alert isolation, a data fusion model in distributed intrusion detection is put forward.
29) Red - M and Madge Networks, Red - Alert Pro and WLAN Probe WLAN intrusion detection devices.
30) The study background and significance of system evaluation and intrusion detection are introduced in this paper.
31) In the design of the network intrusion system, the design of the intrusion detection engine is the key link.
32) By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
33) The feasibility to apply the algorithm of non - negative matrix factorization on intrusion detection is demonstrated.
34) Main work include:The article analyzed currently intrusion detection technique the weakness of haleness, study and ability. etc.
35) An effective and precise pattern matching algorithm is important to intrusion detection system.
36) Adaptive model is a detecting model which is automatically built of intrusion detection systems based on data-mining.
37) On the other hand, EACA is used in intrusion detection module, which makes new intrusions be detected.
38) An efficient intrusion detection technology on probabilistic neural networks is presented.
39) Intrusion detection system is called the second strobe of security.
40) By expressing the magnanimity datum with a small-scale network, clonal network structure was adopted in training the intrusion detection so as to get the compressed data.
41) The most important sector in Misuse intrusion detection is pattern matching.
42) The Unified Wireless Network package consists of a set of wireless local-area network controllers, access devices, and software for WLAN management and intrusion detection.
43) At last, the paper bring forward the network security protection architecture based on Intrusion Detection for a integrated network security cycle.
44) According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
45) It is necessary to analyze feature of input data before intrusion detection.
46) Network intrusion detection module will analyze the package from data packet capture modules and combine network intrusion rule database, and then transmit the results to the system management module.
47) AIDE is an intrusion detection system that detects changes to files on the local system.
48) Through setting up the model characteristic storehouse and describing the systematic procedure, this paper states its principle based on the description of the frame of Intrusion Detection System.
49) The paper also discusses a new intrusion detection technology: protocol analysis.
50) When applying the algorithm to network behavior intelligent learning of intrusion detection system, the error rate is about 10%.
51) Tests indicate that AIAID in intrusion detection can obviously shorten training time and improve detection efficiency.
52) A new intrusion detection method is proposed based on WHVDM kernel function and Center Distance Ratio ( CDR ) .
53) The model of the network security monitor system discussed in the thesis uses the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
54) This clustering algorithm can deal with network intrusion detection from mass unlabeled data, distinguish between normal and abnormal data and detect unknown attacks.
55) It's Security Agents for Network Traffic Analysis uses mobile software agents for intrusion detection in a network of computers.
56) Be able to generate intrusion detection system log to record all detected events.
57) In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.
58) This paper proposes a new anomaly intrusion detection method based on support vector data description(SVDD ).
59) This paper analyses the current intrusion detection techniques, brings forward a technique that applies cluster algorithm to network intrusion detection, and shows the effect through an experiment.
60) At first, the procreant background and the development process of intrusion detection system was introduced.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2024/7/6 2:35:01