1) Perimeter Intrusion Detection Systems
围界入侵探测系统
1.
Introduction of Several Outdoor Perimeter Intrusion Detection Systems Owned by Magal Group;
MAGAL集团的几种围界入侵探测系统简介
2) IDS
入侵探测系统
1.
It is based on the analysis of the protocol used by an application,extraction of specific patterns of the protocol,coding of such a pattern in rules to be fed to an intrusion detection system(IDS),and validation of the pattern via network traffic monitoring with SNORT(an open source IDS) fed with the devised rules.
该方法分析BitTorrent协议,识别BitTorrent协议特征,并对这些特征设定规则,使其能够被入侵探测系统识别,然后通过带有SNORT(一种开放源代码的IDS)的网络监控这些特征,达到探测数据流的目的。
3) perimeter intruder detection
周界入侵探测
1.
Application of quadrature detection technology in perimeter intruder detection system;
正交检测技术在周界入侵探测系统中的应用
5) IDS
入侵检测系统
1.
Investigation into IDS based on biological immunology;
基于生物免疫学的入侵检测系统研究
2.
IDS (Intrusion Detection System)Based on K-Means Algorithm;
基于K-平均值方法的入侵检测系统
3.
The Design and Implementation of IDS Supporting High-precise Alert;
支持高精度告警的入侵检测系统的设计与实现
6) intrusion detection system
入侵检测系统
1.
Design and implementation of distributed intrusion detection system based on management agent;
基于管理代理的分布式入侵检测系统设计
2.
Research of network intrusion detection system;
网络入侵检测系统的研究
3.
Design of a new type integrated classifier for network intrusion detection system;
网络入侵检测系统的新型综合分类器
补充资料:核爆炸地震波探测(见核爆炸探测)
核爆炸地震波探测(见核爆炸探测)
nuclear explosion seismic detection
hebaozho dizhenbo tanee核爆炸地震波探测(nuclear explos,onseismie detecuon)见核爆炸探汉,l。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条