助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   入侵 在 计算机软件及计算机应用 分类中 的翻译结果: 查询用时:0.428秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
环境科学与资源利用
生物学
植物保护
行政法及地方法制
中国近现代史
林业
世界历史
更多类别查询

图标索引 历史查询
 

入侵
相关语句
  intrusion
    Research on Key Technologies in Intrusion Detection Based on Pattern Recognition
    基于模式识别的入侵检测关键技术研究
短句来源
    The essential problems are discussed based on an intrusion forensic model on the fusion control,such as association analysis,association cluster and firewall.
    本文在数据融合入侵取证模型的基础上重点对融合中心控制台进行分析,包括关联分析、关联簇形成、与防火墙联动的机制、入侵检测系统的主动反馈机制等模块。
短句来源
    Network Intrusion Intelligent Real Time Detection System
    网络入侵智能化实时检测系统
短句来源
    An Intrusion Tolerant CA Scheme
    一种入侵容忍的CA方案
短句来源
    Common Intrusion Detection Knowledge Self-optimization Frame
    通用入侵检测知识自优化框架
短句来源
更多       
  invade
    But, at the same time, electronics government bring convenience to people, its safety also concern by people more and more, by using of pilferage legal power, illegal broken etc to invade the electronics government system have already become the hacks' main methods.
    但是,电子政务在给人们带来方便和快捷的同时,其安全性也越来越广泛地受到人们的关注,利用窃取权限、非法侵入等手段对电子政务系统进行入侵、破坏等活动已经成为黑客的惯用手段。
短句来源
    Invade to examine the system( IDS) conduct and actions safety defensive finally a defense line, can used for examining the multiform invading the behavior, is an importance of the safety defense system to constitute the part.
    入侵检测系统(IDS)作为安全防御的最后一道防线,能够用于检测出各种形式的入侵行为,是安全防御体系的一个重要组成部分。
短句来源
    Technical development in calculator with invade technical development as into the research that lift examined the system to put forward the new request.
    计算机技术的发展和入侵技术的发展为入侵检测系统的研究提出了新的要求。
短句来源
    Safe and count for much key in information in conduct and actions a wreath, invade the examination, early-warning technique should cause our value.
    作为信息安全的非常重要的关键一环,入侵检测、预警技术应该引起我们的重视。
短句来源
    But in carried higher environment, then use to invade to examine the engine super-speedly, lift the high performance in order to.
    而在负荷较高的环境中,则使用高速的入侵检测引擎,用以提高性能。
短句来源
更多       
  “入侵”译为未确定词的双语例句
    This paper discusses application of data mining based on rough set in wireless network IDS,and makes some experiment on the algorithm in Ad Hoc wireless network.
    对基于粗糙集的数据挖掘与知识发现在无线网络入侵检测中的应用作了一些探讨,并以某无线Ad Hoc网络分布式入侵检测中基于粗糙集约简的分类算法为实例作验证。
短句来源
    Risk evaluation for the sea water in Shandong Province based on GIS
    基于GIS的山东沿海地区海水入侵灾害评价
短句来源
    Study of Post-Intrusion Database Recovery System
    数据库入侵事后恢复系统的研究
短句来源
    Integrated database security architecture based on intrusion-tolerance
    基于入侵容忍的集成数据库安全结构
短句来源
    Data mining technology's application on IDS based on system call
    数据挖掘技术在基于系统调用的入侵检测中的应用
短句来源
更多       
查询“入侵”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  intrusion
Design of a new type of integrated classifier for network intrusion detection systems
      
Based on the analysis of the network intrusion detection model, a new design scheme for the integrated classifier is proposed.
      
By means of the single-zircon U-Pb isotopic method, the intrusion age is reported in this paper, which is (151.7±1.6) Ma for a patched granite body (the source granite for Nb-Ta).
      
The gas intrusion into the reservoir causes the development of fractal fields.
      
The flow structures are considered in the region of intrusion of the Poiseuille or Hamel flow into the zone of predominance of the intense vortex formations and for outflow of the fluid from this zone.
      
更多          
  invade
canadensis has the physiological potential to widely invade China.5)The aboveground growth rate and most of the underground morphological parameters vary remarkably among the seasons, with a peak normally occurring in September.
      
Since the basic function of eosinophils is to invade inflamed tissues, our results indicate that TBT, and possibly other organotin compounds, may affect major cellular properties involved in the determination of in vivo eosinophil function.
      
First, the parasite profits immensely from its ability to interact with, and invade, a large number of host cell types.
      
They participate in extracellular matrix remodeling, activate cells and enable them to migrate and invade into different tissue layers.
      
Meningococci and Haemophilus influenzae may invade the subarachnoid space during the bacteriaemic phase without impairment of the blood-CSF barrier and in the absence of any leucocyte reaction.
      
更多          


This paper describes the features and shortcomings of common method of preventing and controlling computer virus at present, and presents a scheme to subdue virus by means of the way to cut off virus intruding into computer and to get the operation right, as well as specific methods against various viruses. Today, our microcomputers that have been reformed on the basis of the suggusted method can prevent all known viruses intruding.

本文论述了当前常用计算机病毒防治方法的特点及不足,提出了用切断病毒侵入计算机并获得运行权途径的方法来制服病毒的方案,及对付各类病毒的具体办法。目前,根据本办法改造后的微机系统,已能阻止所有已知病毒的入侵

In this paper, throrgh the analysis of the CMOS RAM in the IBM PC/XT286 microcomputer, a simpleand effecfive method for protecting compicter's harddisc has been presented. By seting the CMOS RAM'scontent and thus altering the harddisc's parameters retaining in the CMOS RAM, theharddisc will not be allowed to comnumicate with the system and thus the harddisc is protected. Itis the main feature of this method that without modfying the files or information in the harddisc,the harddisc can be locked, that is the...

In this paper, throrgh the analysis of the CMOS RAM in the IBM PC/XT286 microcomputer, a simpleand effecfive method for protecting compicter's harddisc has been presented. By seting the CMOS RAM'scontent and thus altering the harddisc's parameters retaining in the CMOS RAM, theharddisc will not be allowed to comnumicate with the system and thus the harddisc is protected. Itis the main feature of this method that without modfying the files or information in the harddisc,the harddisc can be locked, that is the resd and write operations will be inhibited and the contami-ation by computer's virus will also be prevented.

通过对IBM PC/XT286微机CMOS RAM的简单分析,介绍了一种方便,实用,有效的计算机硬盘保护方法。此法通过对CMOS RAM的内容进行重新设置,使硬盘在CMOS RAM中的参数发生改变,硬盘无法与系统进行通信,从而起到了保护作用。其特点是不需要对硬盘上的文件或信息进行修改,就能实现对硬盘的加锁,加锁后的硬盘不能做任何读写操作,且可以防止计算机病毒的入侵

Virus-Invasion is a very much perplexing problem.Various methods have been proposed, but there is hardly any one which can approve of its reliabi- lity and versaltility.In this paper, a new approach is presented.It is based on the conception of establishing an environment which is capble of freeing from foreign invasion,This strategy is different from those conventinally used. It may be profitable for a specailized system.

本文提出了防止病毒入侵微机系统的新方法。即切断病毒传播路经,并以专有软磁盘卡作为技术手段将其实现。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关入侵的内容
在知识搜索中查有关入侵的内容
在数字搜索中查有关入侵的内容
在概念知识元中查有关入侵的内容
在学术趋势中查有关入侵的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社