埠識別 的英文怎麼說

中文拼音 [zhìbié]
埠識別 英文
pid port identification
  • : 名詞1. (碼頭) pier; port; wharf; jetty 2. (有碼頭的城鎮) port city3. (商埠) commercial port
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. Image targets swatch set is carve up to several subsets firstly, and each subset is corresponding to one output port of network. then a bp neural network can be constructed to complete vehicle target recognition. with the above method, image targets of several types of vehicles are tested in

    其基本思想是,先用改進的c -均值動態聚類方法將車輛目標的訓練樣本集劃分成若干子集,每個樣本子集對應神經網路的一個輸出,以此原則來構建一個bp神經網路,再代入樣本進行訓練后即可用於未知的車輛目標樣本。
  2. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議棧指紋特徵來操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。
  3. This article uses cpld technology to improve the hardware integration degree so as to ensure the high system reliability ; it applies digital signal process technology to producing and recognizing large volume ditigal voice signals in switch systems ; it replaces the old - used special voice signal process chips, thus lowers the cost, improves the quality ; it uses high quality common pc 104 units to complete the main processor tasks, which greatly improves the signal processing capability in the digital switch systems, and provides a great convinence for future technology upgrade as well ; in system archtecture, we exploit modular design technique on client ports and repeater ports, which gains more reliability and easy maintenance

    本文主要採用了cpld技術提高硬體的集成度以保證系統的高可靠性:用數字信號處理技術完成交換系統中大量的語音信號的產生和,代替以前的專用語音信號處理晶元,降低了成本,提高了性能:用高性能的通用pc104單元完成主處理機的工作,大大提高了數字交換系統的信息處理能力,並為今後的技術升級提供了方便:在系統結構上對用戶和中繼採用模塊化設計,性能可靠,維護方便。
  4. The article focuses on the five important technologies we used, including the router detection technology, the os identification technology, the port identification technology, the trojan horse technology and the ports - reflection technology

    本文重點討論了系統在實現過程中採用的目標網路尋徑技術、操作系統類型技術、特定埠識別法技術、木馬技術、反彈技術等關鍵性技術。
  5. Finally, the thesis analyzes address scan, port scan, operate system identify etc. to find what protocol to be used by the attacker in the information collections stage, and designs some program to deceive the attacker. also, in this section the style of honeypot, and the security of honeypot, including two designs about how to abduct the intrusion to the honeypot, the nat ( network address translation ) technique and the proxy technique will be discussed

    在第三部分,分析地址掃描、掃描、操作系統等信息收集階段的攻擊的原理和所利用的協議,以及所採用的攻擊手段,詳細的論述對地址掃描攻擊的欺騙、對掃描攻擊的欺騙、對操作系統攻擊對欺騙的設計與實現。
分享友人