detection and security system 中文意思是什麼

detection and security system 解釋
鑒測與安全系統
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  • and : n. 1. 附加條件。2. 〈常 pl. 〉附加細節。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包過濾技術由於其自身的缺陷而不能提供完全的安全保護。入侵檢測作為一種主動防禦技術,是包過濾的重要補充,起到了第二道防線的作用。內容過濾彌補了前兩種技術在信息內容防範方面的不足,形成了安全防護的最後一道屏障。
  2. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  3. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  4. Static defense relies mainly on firewall and intrusion detection system, so it is hard to meet the users ’ requirement for security

    靜態保護以防火墻系統和入侵檢測系統為主要安全組件,能提供對攻擊的識別和數據包的過濾等保護功能。
  5. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。
  6. Fault tolerant control is one kind new technique with the aim to enhance the system security and system reliability. ftc is basically depended on a great deal of online detection, parameter identification and model calculation. it can revise the system control rules when the fault occurred and then maintain the system operation according the original goal

    容錯控制是一種提高系統安全性和可靠性的新技術,容錯控制以大量的在線故障檢測、參數辨識和模型計算為基礎,在系統出現故障時,適時修正系統的控制率,使系統繼續維持既定的運行目標,具有適應能力強、可靠性高、功能強等特點。
  7. In security defense measures, the author advances a dynamic defense system, the core of which is intrusion detection system, namely the linkage with intrusion detection system, vulnerability scanners system and firewalls system

    安全防護措施中提出了以入侵檢測為核心的動態防禦體系,即入侵檢測系統與漏洞掃描系統和防火墻系統的聯動,同時,建立了日常安全維護體系和應急響應體系及風險評估機制。
  8. Pile ng examination of the system based on the latest promulgated by the ministry of public security, " motor vehicle drivers license application and management " ( decree 71 ), the two examination subjects ( zhuangkao ), computer images using real - time detection technology and electronic infrared optical interface detection technology, i combine the companies creating two - dimensional moving object identification and tracking software through acquisition of vehicles running state examination pile pole, the signal line, after computer processing, analysis and judgment, the actual realization of the computer monitor screen on the basis of the examination process real - time simulation, tracking examination candidates track and record car line, is set admission, examination results published combines the real modernization zhuangkao tools

    本系統依據公安部最新頒布的《機動車駕駛證申領及管理規定》 ( 71號令)中有關科目二考試(樁考)的規定,採用微機圖象實時檢測處理技術及電子紅外線光界面檢測技術,結合我公司獨創的二維移動物體識別跟蹤軟體,通過採集考試車輛運行狀態、樁桿、庫線等信號,經過微機處理、分析判斷,真正實現了在微機監視屏上根據考試過程實時模擬、跟蹤考生考車軌跡並記錄路線,是集錄取、考試、發表成績為一體的真正的現代化樁考工具。
  9. Intrusion detection, one of the most kernel technologies in dynamic security systems ( p2drr ), plays a very important role in the deep defense hierarchy system of network, which is the key of the conversion from static defense to dynamic defense, and as well a powerful tool of forcibly implementing the security policy

    入侵檢測技術作為動態安全系統( p2drr )最核心的技術之一,在網路縱深防禦體系中起著極為重要的作用,它是靜態防護轉化為動態防護的關鍵,也是強制執行安全策略的有力工具。
  10. Our task is to try to combine the technology of multisensor information fusion and distributed intrusion detection, hope to process uniformly all kinds of data and information from multiple heterogeneous distributed sensors so as to evaluate the security situation of all network environment. therefore, a kind of intrusion detection system adapted for internet is needed to design and develop, that is called cyber - ids

    也有一些系統開始採用信息融合的處理技術,如nides [ 6 ] , emerald [ 7 ] ,只是採用的信息融合處理僅限於局部的、底層的實現,沒有從理論上、體系結構上作進一步研究,並加以系統化,以適應大規模異構網路環境的需求,實現更高層次的信息融合和入侵檢測。
  11. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  12. The slide mechanism mainly by pushing for and the hydraulic power system with the necessary supporting wireless sensor detection and computer control system and network components, equipment is small in size, light forces, carrying capacity, a high degree of automation, convenient operation flexibility, security and reliability, the slip lifting the weight of components, and standard features such as unlimited distance

    連續頂推機器人主要由頂推器、液壓動力系統以及與之配套的傳感檢測和計算機無線和網路控制系統等組成,具有設備體積小、自重輕、承載能力大,自動化程度高,操作方便靈活,安全可靠性好,被滑移、頂升構件的重量、尺度和距離不受限制等特點。
  13. For example, the equipment management department of the haven may require such a status detection and security estimation system on their derricks so that detailed states of the engines, retarders and the whole mental structure can be administrated and solve problems in advance to guarantee the normal proceeding of the task.

    港口設備管理部門要求在他們的橋式起重機上安裝一套機械設備的狀態監測與安全評估系統,以便隨時可以監視橋式起重機上各個電動機、減速箱和整體金屬結構的工作情況。以便及早發現問題,在影響裝卸作業以前,排除故障,保證作業的正常進行。
  14. The client integrates the function of security detection and attack, it can measure the security and hole of the goal system and attack or invade the system according to the result of detecting at the same time

    客戶端集成了安全檢測和攻擊功能,能夠對目標網路系統的安全狀況和漏洞進行檢測,同時根據檢測的結果進行類比的攻擊和人侵。
  15. So through these two technologies, we may build a distributed cooperative detection and security protection system in large - scale network, which is competent for distributed detection, cooperative work and dynamic protection

    將這兩種技術相結合應用於網路安全保障系統中,能夠滿足分散式監測、協同工作和動態防護等現代大型網路監測和安全保障系統的特殊要求。
  16. Based on analysis of network security and network applications, the paper emphatically discuss necessity and feasibility on applying corba technology and cooperative technology to safeguard network. the distributed cooperative detection and security protection system model in large - scale network, dcds, is proposed. several key issues in dcds, for example, object interaction, group communication, cooperative data analysis and cooperative response are discussed in detail

    本文在分析目前網路安全及其應用發展趨勢及存在問題的基礎上,重點分析、論證了將corba技術和協同技術引入到網路安全領域的必要性和可行性,提出了一個分佈、協同的大型網路監測與安全保障系統( dcds )模型及其實現方案,深入研究了系統實現中對象交互、群組通信、協同分析和協同響應等關鍵技術問題及解決方法。
  17. With the rapid development of electronic and creative technology, the single - chip microcomputer has been widely used in many fields, such as detection and automatic control system, because its security, high performance and low price

    隨著電子技術和生產製作工藝的迅速發展,單片機以其高可靠性、高性能價格比,在工業測控系統等領域的應用日益廣泛。
  18. In this linkage frame foundation, the system has realized the intrusion detection, and the honeypot joint operation and the intelligent linkage response technology, effectively enhance the system network security performance

    在此聯動框架的基礎上,系統實現了入侵檢測和蜜罐的協同工作和智能的聯動響應技術,有效的提高了系統的網路安全性能。
  19. In chapter 1, i review the condition of network security and introduce the background about intrusion detection. the introduction of data mining includes its processes, methods, classification and application. the introduction of intrusion detection includes its system model, classification, detection technologies

    第一章:網路安全的形勢回顧,入侵檢測開發的背景知識介紹;數據挖掘技術及相關問題、挖掘過程、方法;入侵檢測相關問題、分類、檢測過程;數據挖掘和入侵檢測在數據庫上結合的系統模型。
  20. The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government

    其安全性涉及到物理級、網路級、系統級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體系的應用層出發,基於j2ee技術,對電子政務系統中信息的保密性、完整性、真實性、可用性和可控性等方面進行研究。
分享友人