protocol analysis 中文意思是什麼

protocol analysis 解釋
協議分析, 規約分析
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  • analysis : n. (pl. -ses )1. 分解,分析;【數學】解析。2. 梗概,要略。3. 〈美國〉用精神分析法治療(= psychoanalysis)。
  1. In this dissertation we present a general, extensible methodology that examines cryptographic protocols. our approach is specify a protocol in cpal ( cryptographic protocol analysis language ), apply hoare and dijkstra ? theory of formal semantics to it, analysis it ? forma ] semantics, define weakest precondition of each kind of language statement

    我們的方法就是用cpal ( cryptographicprotocolanalysislanguage )語言來表示協議,將hoare和dijkstra在形式語義方面的理論應用到該語言,分析該語言的形式語義,定義每種語句的最弱前置條件。
  2. The system primarily uses the protocol analysis technology and mode matching arithmetic in realizing network engine. through the combination of the above two, it effectively monishes the target matching scope and improves the detecting speed

    系統在實現網路引擎時,主要使用了協議分析技術和模式匹配演算法,通過兩者的結合,有效地減小目標的匹配范圍,提高了檢測速度。
  3. The last chapter of the thesis expatiates the design thought and implementation method of a distributed ids with cidf framework based on protocol analysis

    文章的最後一章詳細闡述了一個分散式的、具有cidf體系結構的、基於協議分析的ids的設計思想和實現方法。
  4. Next, introduct the technology of the protocol analysis. it means when examin the data packet, wo can use the protocol analysis technology to distinguish the protocol type of the data, then use the corresponding data analysis procedure to examin the data packet. so the examination efficiency can improved. finally, the k - r algorithm used for system data analysis module is parallelized design. and through the comparision the original algorithm and parallel algorithm, we can find that under the

    即在對截獲的數據包進行檢測時,先使用協議分析的技術辨別數據包的協議類型,再使用相應的數據分析程序來檢測數據包,從而提高了系統的檢測效率; 5 )對系統數據分析模塊中使用的k - r模式匹配演算法進行了并行化設計,並比較了原演算法和并行演算法的時間復雜度和執行代價。
  5. The research presented in this thesis was a sub - project of the national high technology research and development program of china ( no. 2004aa424530 ) on case - based industrial design ( cbid ) system. the procedural knowledge retrieve in case - based nc machine tools form design system is the focus of the research. with the analysis of the theory, a cognitive experiment with the method of protocol analysis was conducted to capture and identify the procedural knowledge and design problem domain, and the model of procedural knowledge search is proposed with the concept of membership from fuzzy theory

    本文是「 863 」國家科技攻關項目「基於案例的工業設計技術( casebasedindustrialdesigncbid )和輔助設計應用系統研究」的研究子課題之一,文章研究重點為系統中數控機床工業設計中程序型知識檢索,通過理論分析和實驗研究,探討其在cbid系統中的實際應用模式,最後引入模糊數學中隸屬度的概念,探討了其在系統中的實現方式。
  6. In the " per - protocol analysis " of 338 ertapenem - treated and 334 cefotetan - treated patients, the failure rate was 28. 0 % and 42. 8 %, respectiely, an absolute difference of 14. 8 % again faoring ertapenem

    在338名用厄他培南治療的和334名用頭孢替坦治療的病人的「按方案分析」中,失敗率分別為28 . 0 %和42 . 8 % ,又有14 . 8 %的絕對差異支持厄他培南。
  7. So we made a systematic study about han and sala students " processes characteristics and influence factors of mathematical applied problem solving, with diff erent methods such as protocol analysis, questionnaire, surveying and so on. here are our conclusions. 1

    針對這一現象,本研究採用口語報告法、書面測驗法、測量法等多種方法對漢族與撒拉族學生數學應用題解決的過程、特徵及影響應用題解決的因素進行了較為系統的研究,結果表明: 1
  8. Np is a programmable hardware and it is optimized for packet processing, protocol analysis, routing, voice integration and qos

    Np是用於實現報文處理、協議分析、路由、語音數據集成和qos等通信工作的可編程硬體。
  9. The theory of protocol analysis is listed. by explaining the course of nimda virus evades computer and server, it shows the reason why protocol analysis can detect nimda virus. afterwards it lists the advantage that pattern match can " t have

    重點介紹了協議分析的工作原理,並以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,並概括出其具有模式匹配無法比擬的優勢。
  10. The characteristics of ipv6 and protocol analysis

    6網際網路協議的特點分析
  11. A discussion on realizing process of network protocol analysis

    網路協議分析實現過程探討
  12. Teaching reformation of network protocol analysis experiment

    網路協議分析實驗課的教學改革
  13. Mobile ad hoc routing protocol analysis on tcp

    路由協議分析
  14. The application of the protocol analysis technology in ids is also discussed in this paper

    對協議分析技術在ids中的應用進行討論。
  15. Secondly, the thesis discusses protocol analysis that is the 3rd generation intrusion detection technology

    接著,介紹了第三代入侵檢測技術? ?協議分析。
  16. If you know how to position and practice this skill in the it industry, you ' ll be regarded as " network protocol analysis guru "

    如果?懂得運用這項技能並且給予適當的定位, ?就可以在it產業當一個網路通訊協定分析專家。
  17. One was the cognitive skill acquisition through problem solving, which could be divided into three stages. the first stage, around 1960 ' s, using the protocol analysis initially, concentrated on the fields of unwell - defined knowledge, with the main research topic shifting from the effects on problem solving to the process of solving the specific problem

    關于樣例學習基本加工機制的研究有兩條線索,一是從問題解決的角度研究人類認知技能的獲取,大概經歷了三個階段:第一階段大約在20世紀60年代,研究范圍集中於知識貧乏領域,所關心的問題由影響解題困難的原因,逐步轉向解決一個具體問題的加工過程。
  18. Secondly, the author plans and completes a network ids which adopt the protocol analysis and pattern match method. ip fragment reassembly and tcp stream assembling is analyzed and completed, decoding the http request which coding by the unicode to the ascii

    作者分析和實現對網路數據包的捕獲、對ip協議解碼和tcp協議解碼,正確的實現了ip分片重組和tcp流還原,將unicode編碼的http請求解碼為ascii編碼。
  19. This dnids is composed of four parts : ldu, smu, gau and mcu. finally, the author studies the technology of nids in linux including the intrusion technology and system design. brings forward a integrated frame of a dnids, it concludes the following modules : network packet capture module, network protocol analysis module, rules analysis module, etc

    最後在linux平臺下分析研究了基於網路的入侵檢測技術及其系統設計,提出了一個結構完整的入侵檢測系統框架,主要包括的模塊有:網路數據包捕獲模塊、網路協議解析模塊、規則解析模塊、決策模塊、響應模塊、通信模塊、存儲模塊、互動介面和界面管理模塊。
  20. It is capable of real time data stream analysis, ip data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security

    Snort是一個輕量級的網路入侵檢測系統。它具有實時數據流量分析和日誌ip網路數據包的能力,能夠進行協議分析,是網路安全領域的一個新興的熱點。
分享友人