防禦系統分析 的英文怎麼說

中文拼音 [fángtǒngfēn]
防禦系統分析 英文
defense system analysis (dsa)
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  • 防禦 : defense
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents acoustic localization algorithm and discusses the affect of wind to the localization, then a method of how to correct the affect of wind has been studied, upon this a dsp software system has been designed

    智能雷彈是超低空飛行的武裝直升機的重要武器,而被動聲探測技術是其關鍵技術,本文結合「九?五」國預研項目「反直升機智能雷彈聲復合引信技術」的研究,對空間目標聲定位演算法和風對被動聲定位的影響及如何對這種影響進行修正進行了深入,並在此基礎上設計了dsp軟體
  2. The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents two type of acoustic localization algorithm, emphasizes the discussion of algorithm and presicion of space acoustic localization with sensors at different height in detail and compares them

    智能雷彈是超低空飛行的武裝直升機的重要武器,而被動聲探測技術是其關鍵技術,本文結合「十?五」國預研項目「反直升機智能雷彈聲復合引信技術」的研究,對兩種空間目標聲定位演算法進行了深入,重點討論了空間高低陣定位演算法,了定位精度。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息安全體模型和實施標準的不足,本文緊密圍繞層、級、動態以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體模型基礎上,提出了用於指導計算機信息安全體建設的動態縱深安全體模型; 2 )在對各種安全體標準進行研究與的基礎上,引入了安全域和安全護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息安全的方法和要求; 3 )在安全體模型和安全的基礎上,提出了安全管理及安全技術的級要求,從而便於進行計算機信息的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體動態協同能力的協同通信平臺。
  4. Representation, classification and global reference name standard of the common security knowledge, are summarized. then a new model of system security trend analysis is presented, which combines vulnerability analysis ( using privilege graph analysis method ) and attack knowledge analysis ( using goal tree analysis method )

    本論文首次從信息對抗的角度了公共知識獲取和安全趨勢的意義,總結了公共知識類、標準與知識描述等方面問題,給出動態中公共知識獲取的方法,提出了權限圖與攻擊樹相結合的目標安全趨勢方法。
  5. The author poil1ts out tl1at it is co111paratively safe to adopt multi - layer security system among so many interfacc secul. ity systems. finally, the thesis gives the construction of tl1e 1 ' rame of wholc delbl1se systems in which organization and relationship of eacl1 of the systems will be described individually

    在此基礎上從多種接入安全體中,指山了採用深層來建立接入的安全,並重點建立了整個的框架,在整個框架中又別描述了各個的組成,以及它們的相互關
  6. Whereafter, based on the analysis on the flood influence for traffic lines, the research is centered on the following parts : firstly, the destroying modes, reasons and mechanism of flooded lines are discussed, and the frameworks and countermeasures of preventing and controlling hazards system are put forward ; secondly, the ways of region forecasting for the landslide are analyzed and the automation of landslide forecast for certain site through visual programming is realized. furthermore, the function of dynamic segmentation in arc view is made use of to realize the forecast result ' s visualization ; thirdly, the reasons and patterns of roadbed subsidence are discussed and the methods of forecasting subsidence based on the gm ( 1, 1 ) model are put forward. then the applications of the arcview software and its extended module on the study of roadbed subsidence are debates upon ; fourthly, an analysis on the sources of flood for traffic lines, which situate in the reservoir coverage area, is given

    接著,論文探討了山區交通線路災害的特點、類、時間和空間佈規律以及災害的治原則和對策等;然後,以洪水災害對交通線路的毀壞為主線,重點研究和了以下幾個問題:第一,探討了洪水對交通線路的破壞方式,水毀原因以及水毀機理,並提出了交通線路水毀框架和對策;第二,了雨季邊坡塌方災害的區段預測方法;通過可視化編程,編制了雨季邊坡塌方災害的工點預報程序,並結合arcview實現了預測結果的可視化;第三,對路基沉陷原因和模式進行了,並提出利用gm ( 1 , 1 )模型對路基沉陷區進行和預測,最後論述了arcview軟體及其擴展模塊在沉陷區研究中的應用;第四,對汛期庫區線路災害的原因進行了,並探討了利用數量化理論對路基護工程抗洪能力進行預測的意義;第五,提出從風險的角度對交通線路的災減災進行管理,對風險估計的相關問題進行了論述,並探討了交通線路水害危險區段的劃問題。
  7. Defense system analysis

    防禦系統分析
  8. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體結構;基於源的ddos方法作為反向追蹤有用的補充,將部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  9. This dissertation is designed to analyze the dynamics of us government to develop national missile defense after cold war. adopting the methodologies covering international systematic analysis and domestic political analysis, the thesis hopes to compare and analyze five factors including threats, strategy, techniques, arms control and cost, which influence in various degree us policy on national missile defense after cold war, and reaches the following key conclusions : 1

    本論文利用國際層次法和國內政治層次法,比較威脅、戰略、技術、軍控和費用5因素在冷戰后對美國發展國家導彈政策的影響,並得出結論認為:第一、美國發展國家導彈的動因是威脅、戰略、技術、軍控和費用等5個因素相互共同作用的結果。
  10. X - band ground based radar ( gbr ) plays an important role in national missile defense ( nmd ) system, it has many important functions such as middle stage surveillance and interception, trajectory prediction, target identifying and classifying. it has important significance to analyze and study gbr system, not only for ballistic missile ’ attack and defense research, but also for our national space surveillance and ballistic missile defense system development

    X波段地基雷達( gbr )是美國國家導彈中段和攔截中最主要和最有效的目標精確跟蹤和識別傳感器之一,它負責中段監視和截獲、預測彈道和實測彈道的精度、識別和目標類等重要功能,對gbr的和模擬研究,探究其工作機理和識別手段,不但對于研究彈道導彈的有效突措施和攻對抗有著重要意義,對于發展我國自己的空間監測和彈道導彈也有著重要的參考價值。
  11. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷攻擊做出改進,並進行形式化、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids的動態特性,為彌補火墻靜態的不足,設計出兩者聯動的方法,探索了高效網路安全體模式研究的新方向; ( 4 ) hef火墻實現模式的理論研究及模擬實驗,所得三部研究結論均可設計出module ,內嵌入火墻中,為國內火墻產品的設計提供了一定的理論基礎。
  12. The structure of platform system security is determined through analyzing its needs. the platform system security is detail designed from two parts : passive recovery and positive recovery. at last the detail implement plan of platform system security is expatiated from deployment of firewall and intrusion detection system

    通過平臺安全需求的,制定了平臺安全體結構,別從被動和主動兩方面對平臺安全進行了具體的設計,最後從火墻配置和入侵檢測配置的角度,闡述了平臺安全的具體實施方案。
  13. Firstly, the thesis analyzes the goal of computer network security and the security threat of network faced, and then introduces several traditional security techniques such as data encryption techniques and firework techniques. it analyzes the problems of these traditional security techniques and brings forward combine intrusion detection system ( ids ) and the traditional network security techniques to create multi - layers recovery system. it indicates the status in security domain and its significance of ids

    本論文在了計算機網路安全的目標以及網路所面臨的安全威脅基礎上,討論了幾種傳的計算機網路安全技術,如數據加密技術、火墻技術等,並了傳網路安全技術存在的不足,在此基礎上提出了以入侵檢測技術與傳的計算機網路安全技術相結合的多層次,指出了入侵檢測在整個安全領域中的地位以及研究ids的重要意義。
分享友人