attack behavior 中文意思是什麼

attack behavior 解釋
攻擊行為
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  • behavior : n 1 行為,品行;舉止,態度,舉動,表現,行動。2 (生物的)習性;(機器等的)特性,性能,狀態;(...
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  2. Seven main achievements in this paper are as follows : firstly, one network adversary model is proposed, which is composed of three sub - models : network adversary mental sub - model, network adversary attack decision - making sub - model and network adversary attack behavior sub - model

    本義豐要取得七個方面研究成果: 1 )提出了一個網路敵手模型,該模型由三個子模型組成,即網路敵手心智子模型、網路敵手攻擊決策子模型、網路敵手攻擊行為子模型。
  3. Protect our environmental everybody to hope that life is in a clean environment, the health of this for person and grow up is very important, therefore we will advocate to protect environment, but we may often see disorder to throw rubbish, spit out the behavior of phlegm anywhere have not only destroied environment, at the same time also is very not civilized behavior, it is felled that in addition, we also often hear disorder to cut disorder, destroy the incident of trees, this makes a lot of forests become desert, city often gets sand storm attack, environment causes maximum damage, is very unfavourable for our health, therefore we will protect environment

    我們每個人都希望生活在一個干凈的環境中,這對於人的身體健康和成長是非常重要的,因此我們要提倡保護環境,但是,我們經常可以看到亂扔垃圾、隨地吐痰的行為不但破壞了環境,同時也是很不文明的行為,除此之外,我們也經常聽到亂砍亂伐,破壞樹木的事件,這使得許許多多的森林變成沙漠,城市常常受到沙塵暴的襲擊,環境造成極大破壞對我們的健康也很不利,因此我們要保護環境。
  4. Strategy attack means strategy behavior of active attack in the competition by enterprise

    戰略進攻是指企業在競爭中主動採取攻勢的戰略行為。
  5. The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles

    異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。
  6. Behavior and training of the goalkeeper ' s attack and defence sense

    足球守門員攻防意識的表現及其訓練
  7. Then analyze the present status of china lubricants market from macro and micro point of view ; especially identify the buying behavior of b2c and b2b market. and then deeply introduce and analyze the marketing strategy of exxonmobil lubricant in china in terms of " 3p2c ". put forward three inspiring marketing strategies : dual brand strategy means through dual brand you are able to make deep penetration into two different levels of consumers, make your enterprise to reach comprehensive target audiences, at the same time, give competitor ' s brand converging attack from both sides

    本文採用案例研究的方法,首先從市場營銷策略理論入手,闡述了該領域近五十年來的發展歷程及研究現狀,然後從宏觀和微觀兩個層面分析了中國潤滑油行業的現狀,尤其對b2c和b2b市場購買行為特點進行了深入的分析和歸類,接著從3p2c的角度描述和分析了exxonmobil公司潤滑油部在華市場營銷策略,提出三項頗具啟迪意義的市場營銷策略:雙品牌策略即通過雙品牌本身的不同價值,向市場中高低兩個消費層次進行深度滲透,使企業具有更加廣泛的客戶群體,同時,給競爭對手品牌實行兩面夾擊。
  8. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是未標定的不均衡數據集的情況,把攻擊檢測問題視為一個孤立點發現或樣本密度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡數據集對于數目較少的那類樣本分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  9. It tends to attack a part of the brain known as the " limbic system ", a set of interconnected brain structures responsible for the integration of emotion, memory, and complex behavior

    本病傾向于損害腦內稱為「邊緣系統」的部分,這是一組內部互相聯系腦內結構,主要負責情緒、記憶、和復雜行為的整合。
  10. Itids runs under a state transition model, which represents the system behavior for a specific attack and given system configuration that depends on the actual security requirements

    Itids以保護集群系統中的服務器正常服務功能為目標,提高網路服務質量( qos ) 。 itids是在網路系統的安全狀態轉換演算法控制下運行的。
  11. Ingrid visser of the environmental group orca research said the dolphins behavior was understandable, as they attack sharks to protect themselves and their young, and similar incidents had been reported round the world

    英葛蕾薇莎同時也是環保團體orca research的一員,她說:海豚的行為是可以理解的,它們會為了保護自己與幼豚而攻擊鯊魚,世界各地不乏類似的報導。
分享友人