助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[108]条 当前为第41条到60条[由于搜索限制,当前仅支持显示前5页数据]
 

相关语句
traditional security
    As a kind of active measure of information security assurances, intrusion detection acts as an effective complement to traditional security protection techniques. By building dynamic security circle, it improves the assurance ability of information systems to the utmost extent, and reduces the danger to systems brought by security threats.
    作为一种主动的信息安全保障措施,通过构建动态的安全循环,它有效地弥补了传统安全防护技术的缺陷,减少安全威胁对系统造成的危害,最大限度地提高系统的安全保障能力。
    Intrusion detection makes up the disadvantages of the traditional security technology and result in active defense.
    入侵检测弥补了传统安全技术的不足,是一种主动的防御技术。
    Through citing the example of the Euro-Mediterranean free-trade zone's building , the article explains the openness, the attention to the traditional security and the non-traditional security, the multi-layer's target by new regionalism.
    本文以欧盟——地中海自由贸易区的建设为例,通过开放性、对传统安全和非传统安全问题的关注、多层次的目标等方面的阐释,用新地区主义的理论进行解读。
    Differeate with the traditional security approach focusing on the invalidity of the intrusion, the intrusion-tolerant can continue to provide the well or sub-well services and ensure the system security and completeness although some parts of the system are destroyed or controlled by the vicious attack.
    与传统安全技术更强调保护系统免之受到入侵不同,容忍入侵的设计目标是系统在受到攻击时,即使系统的某些部分己经受到破坏、或者被恶意攻击者操控时,系统仍然能够对外继续提供正常的或降级的服务,同时保持了系统数据的机密性与完整性等安全属性。
    Chapter two analyzes the Indian strategic interests in Central Asia on the aspects of traditional security, non- traditional security and economy during the post-cold war period.
    第二章从传统安全、非传统安全及经济方面阐述了后冷战时期印度进入中亚地区的战略利益。
    As the necessary part of the security architecture, Security evaluation has become very important in information system protection and safety guarantee. Based on analysis the traditional security evaluation methods, a Improved AHP(IAHP) and Survivability Hierarchical Evaluation Method(SHEM) are presented, which have been implemented in the survivability evaluation of a website.
    本文在介绍了传统安全评估方法的基础上,提出了改进的AHP方法与生存性分层评估方法(SHEM),并将其应用到某新闻网站的安全评估中。
    Traditional security often refers to military security and politics security.
    传统安全主要是指军事安全、政治安全。
    It makes up the limitation of traditional security defending technology.
    它有效地弥补了传统安全防护技术的缺陷。 通过构建动态的安全循环,可以最大限度地提高系统的安全保障能力,减少安全威胁对系统造成的危害。
    As a new network security technology, intrusion detection technology can detect sorts of malicious attacks in time and respond when the net system is endangered. It is a reasonable supplement to traditional security technology such as firewall, and belong one of the research hot of the computer networks.
    入侵检测技术作为一种新兴的网络安全技术,它可及时检测各种恶意的入侵攻击,在网络系统受到危害时进行响应,是对防火墙等传统安全技术的重要补充,属于当前计算机网络研究领域的热点之一。
    On the other, there are great relationship between the NTS and the cooperation force of the traditional security, this relationship prompt the cooperation of East Asia from the interest, regime and the identification.
    此外,在对非传统安全对东亚安全合作的动力作用进行分析时,必须探讨非传统安全到底能在多大程度上起作用,惟有如此,动力分析才有实际意义,本文试将非传统安全的动力作用置于对手、同盟和伙伴三种关系下进行探讨。
    The thesis gives a careful analysis of the defects in traditional security system and the new security requirements of Web Services, carries out a research on the structure, syntax and trust mechanism of Web Services Security Specification;
    本文分析了传统安全的不足及Web服务安全的新需求,研究了Web服务安全规范的结构、语法及信任机制;
    Connecting with my own work experience, based on the research of traditional security techniques, this paper mainly analyzes the technology of invasion detection.
    本论文结合自己的工作实际,在对传统安全技术进行研究的基础上,重点对入侵检测技术进行了分析研究。
    Now, as the key technology of dynamic security defense system, intrusion detection complements effectively those traditional security defense techniques.
    入侵检测作为动态安全防御体系的关键技术,是传统安全技术的有效补充。
    As known to all, after the emergence of the new problems to threat human beings in post-cold war, the traditional security values with state as its center and military affairs as its main keep-away means, is replaced by the new security values.
    后冷战时代,威胁人类新安全问题的出现使得以国家为中心、以军事防范手段为主的传统安全观被新安全观取代。
    The difference between TRBCC model and traditional security model is demonstrated by an example in which multi-VO coordinative computing process is build up and the formal specification of multi-user coordinative computing requirements is performed by the TRBCC model.
    本文通过实例展示TRBCC网格安全需求分析模型以及扩展的Strand Space理论与传统安全模型的不同。
    1. The traditional security assessment of power system is analyzed and its shortcomings is pointed out.
    1.分析了传统的电力系统安全评估的方法,指出了传统安全评估方法的不足;
    These years, the intrusion aimed at computer and its basic equipment emerges in endlessly. To protect the computer and network’s safety, people beginning to study the protecting technology of network security. Intrusion detection system is a new security ensure technology behind the traditional security protecting methods such as firewall, data encrypt techniques and so on.
    为了保护计算机和网络的安全,人们开展了对网络安全防护技术的研究,入侵检测是继防火墙、数据加密等传统安全防护措施之后的又一种新的安全保障技术。
    Traditional security view cannot explain why the human-being is still facing various threats.
    以军事威胁为重心、以国家安全为核心的传统安全观己经不能解释人类面临多种威胁的事实。
    It is difficult to collaborate in Traditional Security between China and ASEAN for lacking of trust in history. But they may collaborate effectively because their common interests in NTS.
    长期以来,由于历史的原因,中国和东盟在传统安全领域缺少信任很难合作,但是双方在非传统安全领域有着重大的共同利益,应该可以合作得很好。
    When such kind of security problem appears, the traditional security theory cannot give very good explanation, cannot provide the practical and feasible means to respond.
    在非传统安全理论指导下,人们有一个基本的共识,就是安全关注的主体,已经超越了原来意义上的国家,上升到世界意义的全人类和下移至组成国家的最小单元——个人。
 

首页上一页12345下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社