計算機入侵 的英文怎麼說

中文拼音 [suànqīn]
計算機入侵 英文
the computer invasion
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Unlawful incursion has been threatening the safety of computer network system

    摘要非法一直威脅著網路系統的安全。
  2. Crime of unlawful invasion into and destruction of information system of computer have been regulated respectively in section 285 and 286 of chinese criminal code. but convictions are very few in our present adjudication practice, which plays an inharmonious notes in comparison to current computer crimes and relative research waves pushed forward by scholars

    我國刑法第285條、第286條規定了非法信息系統罪和破壞信息系統罪,但是國內對此兩罪的司法判決卻非常少見,這與犯罪的現狀和學界對犯罪的研究熱潮是不協調的。
  3. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步數字信息化高度發達的時代,和網路遍及社會的每一個角落,信息安全和知識產權不可犯也提到了一個新的高度,如何保證數據信息的安全和軟體知識產權成了信息技術領域關心的熱點問題。
  4. Since the thymic carcinoid had a tendency of local invasion and distant metastasis, it should be included in the differential diagnosis of anterior mediastinal tumor identified on chest x - ray or ct films

    由於胸腺類癌具有局部犯及遠處轉移之傾向,當x光或斷層( ct )片辨識出前縱膈腔腫瘤時,必須將其納鑒別診斷。
  5. Without the permission of you, we will not offer your materials to others, but unenclosed the influence by hacker s attacking, computer virus invading or government control, etc

    在未經您同意之前,本站不會把您的資料提供給他人。但不包括黑客攻擊病毒或政府管制等不可抗力造成的影響。
  6. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦制檢測檢測系統( intrusiondetectionsystem )就是監控網路或系統的動態行為特徵並據此判斷是否有的主動防禦措施。
  7. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  8. An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf )

    參考通用檢測公共框架( cidf ) ,設並實現了基於系統調用監控的linux主檢測系統,在其中採用了hmm檢測演法。
  9. Supported by the national high technology research and development program ( 863 program ), the research topic of this thesis is dedicated to negative selection model and its application to intrusion detection

    本課題圍繞免疫學的負選擇檢測模型以及基於該模型的檢測應用展開了深的研究。
  10. Intrusion - detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion

    探測系統是用來探測系統網路上不尋常的活動,以識別出此活動是不友好的或者未經授權的,以便能夠對此作出響應。
  11. Four important item that this part is on the definition the concept ' s foundation of the offense of illegal and irruptive calculator information system, proceeds to that offense treatise

    本部分在定義非法信息系統罪的概念的基礎上,對該罪的四個要件進行了論述。
  12. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成拒絕訪問( denialofservice )等對系統造成危害的行為。
  13. As nearly every computer system is interconnected to other computers or to the internet, securing these computers is critical to mitigate break - ins, data theft or loss, misuse, or even liabilities to third parties

    因為幾乎每臺系統都連接到另外的或者連接到internet ,因此確保這些的安全,對于減少、數據竊取或丟失、誤用甚至對第三方的責任而言是至關重要的。
  14. A sophisticated computerized analysis of noninvasive measurements of optic nerve function and the retina ' s electrical activity showed dramatic improvement in the rats ' visual functions after the procedure

    一項老道的化的未分析測定視覺神經功能,視網膜的電活動顯示了輸程序后視覺功能的提高。
  15. Part vii : keep a lookout of crime

    第七部分:非法信息系統罪的防範。
  16. Part v : the duty to crime of the trespass on computer information system crime

    第五部分:非法信息系統罪刑事責任。
  17. Part vi : lawmaking of the trespass on computer information system crime review

    第六部分:非法信息系統罪的立法檢討。
  18. Furthermore, since computers have entered into all fields of people ' s life through network, when people use their computers consciously ( thinking of person ' s privacy as other working information and inputting them, such as home address, telephone numbers for shopping through network ), or unconsciously ( when using computers normally, people are not aware that he is putting his personal records into his computer, such as personal letters, diaries, etc. ), they expose their privacy to the network, providing the possibility for invaders to infringe upon their rights

    而且,由於在網路社會已經浸透到人們生活的各個領域,人們出於種種目的,將隱私自覺地(作為其他功能性信息的一部分寫,如網上購物時的家庭地址、電話等)或不自覺地(人們在正常利用時,並未意識到自己將有隱私的記錄留在里,如個人信件、日記等)暴露在網上,為擅自闖者留下了權的可能。
  19. Input or upload via my ups any information which contains viruses, trojan horses, worms, time bombs or other computer programming routines that are intended to damage, interfere with, intercept or expropriate any system, my ups, services, content or information or that infringes the intellectual property rights of another

    通過ups輸或加載任何含有病毒、欺騙程序、惡意程序、時間炸彈或其它意圖破壞、干擾或佔任何系統、 "我的ups " 、服務、內容或信息或任何犯其它人知識產權的程序路徑。
  20. It is verified by experiment that this model is evidently powerful for ids

    最後通過對比試驗表明該模型在對計算機入侵數據的分類上有著出色的表現。
分享友人