defense data network 中文意思是什麼

defense data network 解釋
保護數據網路
  • defense : n. 〈美國〉 = defence.
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  1. Kd _ drtss, which takes reflective memory as the real - time network and uses database to store and manage simulation models, configuration information and data of results, is a distributed real - time simulation system developed by military simulation lab of national university of defense technology. it has many advantages, such as “ managing concentratedly, running distributedly ”

    Kd _ drtss是國防科技大學軍用模擬實驗室開發的分佈實時模擬系統,它採用反射內存作為實時網路,使用數據庫存儲並管理模擬模型、模擬試驗配置及模擬結果,具有「集中管理,分佈運行」等優點。
  2. Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users

    它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種防禦措施來削弱和消除攻擊流量對網路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。
  3. In order to enhance the teaching effect, we have developed the network firewall, the data encryption and the email encryption system, the network monitor and control system. the students not only may operate and configure these systems actually, also carry on the network attack and defense, and obtain the experience, grasp the information security elementary knowledge, the elementary operation and the basic config method

    為提高教學效果,開發了與信息安全實驗相關的網路攻擊、網路防火墻、數據加密及電子郵件加密、網路監控等子系統,不但可以由學生實際操作、配置進行網路攻防,使學生可以在此虛擬實驗環境中獲得相關的知識和實際動手操作的經驗,掌握信息安全基礎知識、基本操作、基本配置。
  4. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  5. With the background of national defense preliminary research project, this thesis mainly brings forward the ado network supported model for distributed heterogeneous databases, realizes distributed heterogeneous data interoperation and its multi - agents process control strategy using distributed mts / com + components

    五」預研項目為研究背景,提出了分散式異構數據庫的ado網路支持模型,實現了基於mts com +的分散式異構數據互操作及其多agent過程式控制制策略。
  6. Defense data network, ddn

    國防部數據網路
分享友人