日誌分析器 的英文怎麼說

中文拼音 [zhìfēn]
日誌分析器 英文
log analyzer
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 日誌 : daily record; journal
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務的系統總體設計方案,將系統為以下幾個部:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和審計等) 。論文然後別介紹各個關鍵部的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. The value of the program counter when the logging guard clause is discovered in the analyzed code

    :在所的代碼中發現監護子句時,程序計數的值
  3. Web log mining is applying web mining in analysis of web server log in order to solve problems mentioned above

    Web挖掘就是運用數據挖掘的思想來對服務進行處理,從而解決上面提出的各種問題。
  4. The web log analyzer sample is a windows form application that analyzes log files created by web servers, such as microsoft internet information server. it includes reports that show statistics on page hits, server activity, and referrals from other sites

    Web日誌分析器示例是一個windows窗體應用程序,用於web服務[如microsoft internet information server ( iis ) ]創建的文件,包含顯示有關頁點擊次數、服務活動和其他網站推薦的統計信息的報表。
  5. Principle and implementation in analyzing mail server ' s log file

    郵件服務的原理與實現
  6. Finally, the essay presents analysis and research on the function demand of the safety audit, other audit techniques as well as the security log analysis principle

    最後,本文對安全審計的功能需求和各種審計技術及原理進行了研究,給出了郵件服務的具體實現過程和方法。
  7. This can be another reason why process choreographer performance degrades if you run audit log analysis in parallel with process navigation. to reduce impact on regular process navigation, make sure you store the

    這也可能是在您使用流程引導操作時同時運行審核,此時流程編排性能為什麼會下降的原因之一。
  8. In the paper, we apply the approach of data mining to log analysis system of ids, and especially solve the problem of intrusion model ' s drawing and classifier ' s constructing in the system, which also does solve the automatic process of log analyses

    將數據挖掘的方法應用於ids系統,並構造出了入侵模式提取與檢測建立的處理流程,從而解決了自動化的問題。
  9. Sample : web log analyzer for reportviewer

    示例: reportviewer的網站日誌分析器
  10. In web log analyzer, select open log files from the

    在web日誌分析器中,從「文件」菜單中選擇「打開文件」 。
  11. Ims problem investigator makes ims log analysis quicker and easier than ever before

    Ims問題檢測使得ims日誌分析器比以前更快而且更容易。
  12. Web log analyzer includes functionality that allows you to configure the files that are included in the analysis

    Web日誌分析器具有允許配置中包含文件的功能。
  13. In accordance with practical network environment, we design and implement fault management system fms based on snmp. using client / server architecture, our system established a distributed management model which is compose of console / manager / agent, finished network status monitoring, event processing, fault alarm and log, collecting and analysing mib variable, etc., provided many utilities about detection and browsing

    系統採用了客戶服務結構,建立了由控制臺管理者代理構成的散式管理模型,完成了狀態監視、事件處理、故障報警和、 mib變量的獲取和等多項功能,提供了關于檢測和瀏覽的有關工具。
  14. This thesis introduces the background about this system and solving path at first ; then emphasises to describe ideas and implementation of clustering - algorithm ; furthermore expands on the characteristics and flows of each module ; analyses how to establish security policies ; finally summary full text, and suggest further works, otherwise, it also make point of personalizing hyperlinks and personalizing search - engines based on web data mining, making personalizing application more integrate

    本文首先介紹了論文所提問題的背景和解決途徑;然後說明了本系統的概念定義和目標;重點介紹了系統中聚類演算法的思想和實現;進而詳細闡述了系統各個功能模塊的特徵和流程;了如何通過服務建立安全策略;最後進行了總結,並提出了下一步的工作。此外,論文提出了個性化引擎、個性化鏈接與web數據挖掘的結合,使個性化應用更加全面。
  15. This paper not only establish the remote analysis and audit of the checkpoint netscreen, iptables firewall log, but also establish the remote log audit servicer. it is of much benefit to manager and add the safety of the firewall

    本文建立了checkpoint 、 netscreen 、 iptables等防火墻的遠程和審計,在遠程建立了審計服務。這樣既有利於管理人員又可以增強防火墻的安全性。
  16. Based on web log of hannan univercity, this paper focused on the following aspects : 1 ) aanalyze and reserch technology of web log mining ; 2 ) bring forward a multi - path partitioning cluster method, which partions and clusteres according to user access path to improve effiency ; 3 ) bring forward a hierarchy search and iterative method to find frequent set

    本文結合海南大學web服務,主要研究了以下內容: 1 ) web服務挖掘技術進行了系統的和研究。 2 )提出了多路徑割聚類方法。這種方法根據用戶的訪問路徑進行割聚類,有效地提高了聚類演算法的效率。
  17. The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the

    正文開始從防火墻的技術背景入手,先介紹了網路處理的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了防火墻的整個硬體結構和軟體結構,以及開發環境;然後介紹了網路安全的概念和防火墻技術,並對ipv6協議特點作了較為詳細的;接著按著防火墻設計的步步深入,先提出了ipv6防火墻的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上層vpn 、包過濾核心、應用代理、配置管理、 url過濾、六個控制平面子模塊的功能和實現,並提及系統實現中使用的數據庫。
分享友人