助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   传统安全 在 互联网技术 分类中 的翻译结果: 查询用时:0.079秒
图标索引 在分类学科中查询
所有学科
互联网技术
中国政治与国际政治
计算机软件及计算机应用
安全科学与灾害防治
世界历史
经济体制改革
工业经济
伦理学
电信技术
更多类别查询

图标索引 历史查询
 

传统安全
相关语句
  traditional security
    As a kind of active defense technology, intrusion detection technology detects sorts of malicious attacks in time and responds when the net system is endangered. It is a reasonable supplement to traditional security technology such as firewall.
    入侵检测技术作为一种主动安全防护技术,及时地检测各种恶意入侵攻击并在网络系统受到危害时进行响应,它是传统安全技术如防火墙的合理补充,是一种新兴的网络安全技术,也是当前计算机网络安全理论研究的一个热点。
短句来源
    The intrusion detection is new technology. The traditional security technology include firewall, PKI, encrypt data and identify technology, these are static defense technology. As reinforce of traditional security technology and mechanism, the intrusion detection technology enlarged the depth and levels of the networks security and improved the networks security.
    与其它安全策略及安全技术相比,入侵检测是比较新的技术,传统的安全技术包括物理隔离、防火墙、身份认证、数据加密等都属于静态的防御技术,而入侵检测技术作为传统安全技术和安全机制的补充,具有动态防御的技术特点,它的出现和应用发展扩大了网络安全的保护层次和纵深,增强了网络的防御能力。
短句来源
    As an initiative security defense technology, intrusion detection technology makes up for the weaknesses of traditional security technology.
    入侵检测技术作为一种主动防御型安全技术,弥补了传统安全技术的不足。
短句来源
    Intrusion detection technology is an active security defensive technology that can overcome the shortcomings of traditional security technology.
    入侵检测技术是一种主动防御型安全技术,可以弥补传统安全技术的不足。
短句来源
    Firstly, the thesis introduces the traditional security model and PPDR model, analyses and compares the difference between two models.
    论文首先比较和分析了传统安全模型和PPDR模型;
短句来源
更多       
  “传统安全”译为未确定词的双语例句
    Firstly,comparing traditional secure theory with P2DR secure model,it is pointed out that using P2DR secure model as the theory foundation for the integrated solution of the information security of Chongqing Public DP Network.
    首先,通过对传统安全理论和P~2DR的安全数学模型比较研究,明确提出将P~2DR模型作为解决重庆电信IP网络完整信息安全解决方案的理论基础。
短句来源
    However as a dynamic security defensive mechanism, honeypot can improve effectively integrate safety of large scale of network, Based on analyzing the research situation of honeynet technology, as to the shortcoming of security tools in intrusion detection and in protecting system, the Distributed Virtual Honeynet System (DVHS) is designed and implemented. Our work focuses on the following contents.
    而Honeypot作为一种动态安全防御机制,可以有效地提高大规模网络的整体安全性,是传统安全机制的有力补充。 本文在分析国内外有关网络陷阱研究现状的基础上,针对现有网络安全工具在入侵检测以及防护等方面的不足,围绕网络陷阱技术以及分布式虚拟陷阱网络系统的设计与实现开展研究工作,本文所做的工作主要集中在:
短句来源
    As an initiative safety technique of information, the IDS (Intrusion Detection System) can fetch up exceedingly the disadvantage of tradition safety technique of information.
    入侵检测系统(Intrusion Detection System,IDS)作为一种主动的信息安全保障措施,有效地弥补了传统安全防护技术的缺陷。
短句来源
    So, we develop a network audit system-NAFL (Network security Audit system based on Firewall Log). This system focuses on the security audit function about the essential behavior of the TCP/IP protocol stack. It is an improvement of the other audit system.
    为此,上海交通大学网络中心研究开发了一个基于防火墙日志的网络安全审计系统——NAFL (Netowrk security Audit system based on Firewall Log),该系统强调了TCP/IP协议栈底层行为的安全审计,弥补了传统安全审计系统的不足。
短句来源
    The paper introduces the Web Service structure as well as some common security threats that exist. It also presents the security mechanism widely used nowadays, including XML encryption and signature, SAML, XACML, XKMS and WS-Security.
    介绍了Web服务 体系结构,分析了存在的安全问题,讨论了目前业界提出的安全机制,包括XML加密和签名,SAML, XACML,XKMS,WS-Security等,以及它们与传统安全技术的关系;
短句来源
更多       
查询“传统安全”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  traditional security
Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security.
      
The paper analyses the security dimension of the Greater Mekong Subregion (GMS) by taking into account traditional as well as non-traditional security issues.
      
This article argues that the Asia-Europe Meeting (ASEM) process of multidimensional dialogue plays a prominent role in addressing issues of transnational security in both regions mainly in the field of "soft" and non-traditional security affairs.
      
This thematic issue of International Negotiation on non-traditional security negotiation provides detailed cases and analyses that demonstrate and contrast how the negotiation process performs in resource, economic, food, and military security talks.
      
Traditional security is not a major concern for Pacific Island countries and has not been for at last 50 years.
      
更多          


In this paper,A new security policy on P2DR model is put forward after analyzing the defect of traditional security model.Its nucleus is on-line detection,fast response and quick resumption.At last,the security solution for this model and the instrument to implement this solution are given.

文章在分析Internet面临的安全挑战和传统安全模型缺陷的基础上,提出了一种基于P2DR模型的安全策略,其核心是:在线的检测、快速的响应和及时恢复.最后给出了该模型的安全解决方案以及实现该方案的工具.

Security has always been a harsh problem in network development and application.Traditional security technique is unable to settle the ever changing problem of network security.A dynamic security model MP 2DR 2 is introduced in this paper,and an example of dynamic security technique based on the model is given.

网络安全问题一直是网络发展和应用中的重要课题 ,传统的安全技术已无法解决动态变化的网络安全问题 .本文阐述了一种动态网络安全模型 MP2 DR2 ,并给出此模型下动态安全解决方案配置建议 .

The intrusion detection is a new security technology, apart from tradition security protect technology, such as firewall and data crypt. IDSs watch the computer and network traffic for intrusion and suspicious activities. They not only detect the intrusion from the extranet hacker, but also the intranet users. This paper describes a component based intrusion detection system, which has good distribute and scalable ability. It combines the network based IDS and host based IDS into a system, and provides detection,...

The intrusion detection is a new security technology, apart from tradition security protect technology, such as firewall and data crypt. IDSs watch the computer and network traffic for intrusion and suspicious activities. They not only detect the intrusion from the extranet hacker, but also the intranet users. This paper describes a component based intrusion detection system, which has good distribute and scalable ability. It combines the network based IDS and host based IDS into a system, and provides detection, report and response together. In the implement of the network engine, the combination of network protocol analyze and pattern match technology is used, and reduce scope to search. We also improved pattern match algorithm, the network engine can search intrusion signal more quickly.

入侵检测技术是继“防火墙”、“数据加密”等传统安全保护措施之后新一代的安全保障技术。它对计算机和网络资源上的恶意使用行为进行识别和响应 ,不仅检测来自外部的入侵行为 ,也监督内部用户的未授权活动。提出一种基于部件的入侵检测系统 ,具有良好的分布性和可扩展性。它将基于网络和基于主机的入侵检测系统有机地结合在一起 ,提供集成化的检测、报告和响应功能。在网络引擎的实现上 ,使用了协议分析和模式匹配相结合的方法 ,有效地减少了目标的匹配范围 ,同时改进了匹配算法 ,使网络引擎具有更好的实时性能。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关传统安全的内容
在知识搜索中查有关传统安全的内容
在数字搜索中查有关传统安全的内容
在概念知识元中查有关传统安全的内容
在学术趋势中查有关传统安全的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社