security in network 中文意思是什麼

security in network 解釋
網的安全性
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • in : adv 1 朝里,向內,在內。 A coat with a furry side in有皮裡子的外衣。 Come in please 請進來。 The ...
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  1. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「網路集成防禦系統」 ,通過對網路中各節點主機的防火墻進行管理,在實現多機聯合防禦領域進行了探索研究。
  2. By sustentation fund from national high technology research and development project ( 863 project ) grant no. 2002aa143021, we do an in - depth study on the security in wlan, which is a component of the security technology in broadband wireless ip network

    本文在國家高技術研究發展計劃( 863計劃,項目編號2002aa143021 )的資助下,對寬帶無線ip安全中的組成部分? ? wlan進行了深入的分析和研究。
  3. According to some problems existed in network security information analysis, such as lacking of security description, low information visualization, false - positives and false - negatives, this paper suggests implementing correlation in integrated analysis of network alerts and logs to improve the capability of network security information analysis

    摘要針對當前網路安全信息分析過程中出現的安全描述片面性、信息可視化程度低和誤報警、漏報警現象等問題,提出運用關聯方法對網路中的報警和日誌信息進行綜合分析,用於提高網路安全信息分析能力。
  4. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  5. Next, this paper introduces four kinds of hidden information security trouble existed in network media by detailed cases, which is, false and harmful information spreading ; consequent taking place of network leakage of confidential information ; the overflow of computer virus ; and hacker attack and network information campaigns

    網路媒體作為一個新生事物,針對網路媒體的法律法規的相對滯后,大眾對網路媒體概念也相對模糊混亂,這也使網路媒體面臨的安全問題得不到足夠的重視,缺乏相應的解決方法。
  6. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。
  7. Fortunately, the author of this dissertation took part in network security integrated defend system, a project of the mii ’ s eiif

    本文作者有幸參加了信息產業部電子生產發展基金項目「網路安全集成防護系統」 。
  8. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息代理web計算環境下的空間信息安全性問題基於metadata的空間信息web集成方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  9. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  10. As network processor become core hardware in the next generation network device. the research in this paper is security of network information transmission based - on network processor

    因此網路處理器將成為下一代網路設備的核心硬體,本文的研究問題是基於網路處理器的網路信息傳輸的安全性。
  11. There are corresponding security limitations in physical security layer network security layer server security layer application security layer application designing elements security layer, and ensure absolute security of the whole system

    從物理安全層、網路安全層、服務器安全層、應用程序安全層、應用程序設計元素安全層都有相應的安全限制,保證了系統的絕對安全。
  12. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由器,用來提供網路層一級的安全訪問機制;代理服務器,用來提供應用層一級的訪問控制機制;認證服務器,用來提供用戶身份認證。
  13. We can rebuild the network packets and encryption and decryption data and many other important operations of network security in the layer. in addition, that can elevate the efficiency of the whole system

    實現了對現有的協議棧增加了過濾層,並且可以在該層中實現封包重組,加密解密等網路安全方面重要的操作。
  14. Being the last strobe of security, intrusion detection system also defends the other security sub - system. due to its essential role in network security, research on intrusion detection techniques is of great importance

    入侵檢測作為安全防衛系統的最後一道防線,還能起到保護其他安全子系統的作用,因此對入侵檢測技術進行研究具有十分重要的意義。
  15. With the rapid progress of information technology, it brings about serious problems in network information security

    隨著數字信息技術的迅猛發展,網路上的信息安全問題日益突出,密碼學是解決信息安全問題的基礎。
  16. Relied on the project “ management system of the hydro engineering construction trade of tianjin ” ( msect ) of hcht, this thesis analyzes the national situation of engineering construction trade and the domestic and international network trade at present, expatiates the knowledge of engineering construction trade, discusses the tender review methods which are often used and sets the mathematic models for methods of tender review which are being studied, designs the structure models and application development in detail, at last describes the technologies being used in network security, information security and impartial supervision

    本文依託北京海策環通科技發展有限責任公司承接的「天津市水利工程建設交易管理系統」開發項目,對國內工程建設交易的現狀和國際國內網上交易的情況進行了分析,對工程建設交易理論知識進行了全面闡述,對常用評標方法進行了對比研究,對在研評標方法進行了數學模型方面的探討,對系統的架構模型和應用開發進行了詳細設計和研究,最後對網路安全、信息安全和公正監督等採用的技術進行了重點闡述。
  17. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  18. This paper proposes an implement scheme for a security separate card which can access to harddisk data of computer in security when network is connected, introduces the structure and principle of the security separate card which is based on pci bus, discusses the security separate card ' s hardware design

    摘要文章給出了一種對連網計算機硬盤信息進行安全訪問的安全隔離卡實現方案,介紹了基於pci總線的安全隔離卡的組成及工作原理,詳細討論了安全隔離卡的硬體設計。
  19. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路攻擊、蠕蟲病毒、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有攻擊性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。
  20. Security in network programming

    >網路編程中的安全性
分享友人