说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 滥用入侵检测
1.
The Implementation of Abuse Detection Based on IPv6 Network;
IPv6网络的滥用入侵检测与实现
2.
Intrusion and Manager System-An Application Based on Cooperative Intrusion Detection;
基于协同入侵检测技术的应用-入侵检测与管理系统(IMS)
3.
Research and Application of System Call in Intrusion Detection;
系统调用在入侵检测中的研究与应用
4.
Research on the Application of Model-Checking in Intrusion Detection
模型检测方法在入侵检测中的应用研究
5.
Markov Chain Model of Syscall based Intrusion Detection
基于系统调用入侵检测的马氏链模型
6.
Research on IDS Based on Rough Set;
粗糙集理论在入侵检测中的应用研究
7.
Research of Honeypot Used in Intrusion Detection Application;
Honeypot在入侵检测中的应用研究
8.
Intrusion Detection Research of Host System Call Sequence Based on Classification;
主机系统调用序列分类入侵检测研究
9.
Application of Support Vector Machine in Intrusion Detection System;
支持向量机在入侵检测系统中的应用
10.
Application of Mobile Agent in Distributed Intrusion Detection Systems;
分布式入侵检测系统中移动Agent的应用
11.
Applied Research of Petri Net in Intrusion Detection System;
Petri网在入侵检测系统中的应用研究
12.
The Application of Immune Algorithm in Data Preprocessing of Intrusion Detection;
免疫算法在入侵检测预处理中的应用
13.
Study and about Intrusion Detection System on the Basis of Protocol Analysis;
基于协议分析的入侵检测研究与应用
14.
Research on Application of Data Mining Algorithms in Intrusion Detection Systems;
数据挖掘技术在入侵检测中应用研究
15.
Implementation of Intrusion Detection Technology in "Golden Tax";
入侵检测技术在“金税”网中的应用
16.
Study and Application of Outlier Mining Algorithm in Intrusion Detection;
孤立点挖掘在入侵检测中的应用研究
17.
Research and Application of Intrusion Detection Based on Data Mining;
基于数据挖掘的入侵检测研究与应用
18.
Intrusion Detection System Based on Anomaly and Misuse;
基于异常和误用的入侵检测系统IDSBAM