1) stakeout and detection means for border intrusion
边界入侵监测
2) border intrusion detection
边界入侵检测
3) Intrusion detection
入侵监测
1.
This paper briefly introduces the technique of intrusion detection of Microsoft ISA Server 2000.
研究了微软ISASERVER2000的入侵监测技术,提出了利用ISAServer入侵监测技术来构建计算机网络安全体系结构的方法。
4) IDS
入侵监测
1.
It is discussed in this paper that the security strategy, which includes the optimization of the network switches, the application of HSRP protocol and access-list in the Cisco Catalyst 6509 switch, and the deployment of the firewall and IDS, is applied in the campus network of Tianjin University of Commerce to enhance the stability and robustness of the campus network.
从天津商学院校园网的核心、汇聚交换机的优化、防火墙、入侵监测系统的部署出发,讨论了高校校园网网 络安全策略的实施和部署,提高了网络的健壮性,说明了基于Cisco Catalyst6509交换机双引擎的HSRP协议的配置 和应用,分布式访问控制列表与防火墙包过滤规则的联合应用,以及入侵监测系统的部署,探索了高校校园网提高 稳定性和健壮性的方式。
5) immersed boundary
侵入式边界
1.
For a given motion of the structure,the unsteady aerodynamic load of incompressible fluid was solved by immersed boundary(IB) method without the influence of elastic deformation for fluid being considered.
针对给定的运动规律,对不可压流场采用侵入式边界方法求解了非定常气动载荷,其中未计及弹性结构变形对流场的影响。
6) the sea water inbreak monitoring
海水入侵监测
1.
Application of conductance instrument in the sea water inbreak monitoring analysis;
电导仪法在海水入侵监测分析中的应用
补充资料:大海入侵
法国著名科幻小说家儒勒。凡尔纳的名著
内容提要:法国一家海外公司决定开凿一条运河,将地中海海水引入撒哈拉沙漠,形成一个新海,这就是大海入侵计划。人们亲眼目睹了灭顶之灾,各种各样的动物拼命的逃窜,成百上千的人被卷入汹涌的波涛之中,横七竖八的骑手和马转眼就消失了。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条