security status造句
例句與造句
- returns the security status of an existing soap virtual root
返回現(xiàn)有soap虛擬根目錄的安全狀態(tài)。 - the labefaction of network's security status threatens the security of pc on net
網(wǎng)絡(luò)安全狀況的惡化威脅著網(wǎng)上pc的安全。 - 4 . lcd display shows network signal level, security status, ssid name, battery power level and available channels etc . 5
4.lcd顯示網(wǎng)路訊號(hào)強(qiáng)度保安狀態(tài)網(wǎng)路名稱電池用量及可用通道等 - systems in jovian space have been changed to true 0.0 security status to avoid standing loss issues in future tournaments
朱庇特星系將全部更改為0.0的安全等級(jí),避免今后開(kāi)放參觀后玩家聲望被降低。 - network attack graph is an important method to analyze the security status of computer network, and it plays a guiding role for the establishment of network security policy
摘要網(wǎng)絡(luò)攻擊圖是分析網(wǎng)絡(luò)安全性的一個(gè)重要手段,對(duì)網(wǎng)絡(luò)安全策略的制定具有重要指導(dǎo)意義。 - It's difficult to find security status in a sentence. 用security status造句挺難的
- the ids gathers network-packet in real time, and sends the analyzed results to database . in the end, user will know network's security status from web analysis module
該系統(tǒng)能夠?qū)崿F(xiàn)對(duì)網(wǎng)絡(luò)數(shù)據(jù)包的實(shí)時(shí)采集和分析,并把檢測(cè)結(jié)果保存到數(shù)據(jù)庫(kù)中,最終管理人員還可通過(guò)web管理模塊實(shí)現(xiàn)網(wǎng)絡(luò)安全狀況的分析查詢。 - the shanghai stock exchange new website is an official communications release site providing the service including the securities status release, the securities index release and the securities history
上海市證券交易所新網(wǎng)站是上海證券交易所用于對(duì)外發(fā)布信息的一個(gè)官方網(wǎng)站,包括行情指數(shù)歷史數(shù)據(jù)等信息發(fā)布和查詢等服務(wù)。 - nids based on web : from this module user can get visual and understandable results of intrusion activities which will be useful for user to know current network security status and enhance network's security purposely
這也使得在前面所做的所有工作能夠體現(xiàn)出來(lái),也使得管理人員更易了解到目前網(wǎng)絡(luò)的安全狀況,從而更有針對(duì)性地加強(qiáng)網(wǎng)絡(luò)的安全。 - after analyzing lots of network vulnerabilities and the characteristic of computer network, the model of network security status was built, and the prototype of network attack graph automatic generating system was designed and implemented
通過(guò)對(duì)大量網(wǎng)絡(luò)弱點(diǎn)的分析,結(jié)合網(wǎng)絡(luò)的特性,建立了網(wǎng)絡(luò)安全性分析模型,設(shè)計(jì)并實(shí)現(xiàn)了一個(gè)網(wǎng)絡(luò)攻擊圖自動(dòng)生成原型系統(tǒng)。 - under the control and guide of integrative security policy, pd2r uses detection tool to understand and evaluate the system's security status, and uses proper response to make system most safe and in low risk while using protection tool
本文的內(nèi)容主要包括策略思想的闡述、策略傳輸協(xié)議、策略在安全方面的應(yīng)用、策略在網(wǎng)絡(luò)管理方面的應(yīng)用以及策略傳輸安全性研究。 - besides, applying multisensor information fusion technology to d1ds, so as to realize multi-level and multi-side of information process, monitor and evaluation of network security status, the research on that is less comparatively
此外,利用多傳感器信息融合技術(shù)在分布式入侵檢測(cè)系統(tǒng)中,實(shí)現(xiàn)多層次、多方面的信息處理,以達(dá)到對(duì)網(wǎng)絡(luò)安全狀況的監(jiān)控和評(píng)估,這方面的研究相對(duì)較少。 - administrators of major government infrastructure systems are required to submit to the office a weekly information report on the security status of their systems and other issues relating to it security, thus allowing the office to monitor closely the security level of these systems
政府主要基建系統(tǒng)的管理人員每周必須向辦事處呈交報(bào)告,內(nèi)容包括系統(tǒng)保安狀況和其他關(guān)于資訊保安的事項(xiàng),讓辦事處密切監(jiān)察這些系統(tǒng)的保安水平。 - aiming at researching and realizing distributed monitor on email, the system is mainly applied to collect, analysis, filter and control on such actions as computer crime, hacker attack, information spy and information intrusion and so on . accordingly it can control specific message and behavior by detecting, alerting and managing on security status of some network
本課題旨在實(shí)現(xiàn)對(duì)廣域網(wǎng)環(huán)境下的電子郵件實(shí)施分布式采集和集中監(jiān)控,主要目的是為滿足現(xiàn)實(shí)社會(huì)管理中對(duì)特定涉嫌計(jì)算機(jī)犯罪、非法勾聯(lián)、搞恐怖活動(dòng)等電子郵件進(jìn)行有效地采集、分析、過(guò)濾和控制,并可對(duì)網(wǎng)絡(luò)運(yùn)行安全狀況進(jìn)行監(jiān)控、檢測(cè)以及安全管理,從而實(shí)現(xiàn)對(duì)網(wǎng)絡(luò)特定電子郵件信息的控制。 - according to the security demand of national information system of electronic government affairs, based on a wide-ranging investigation and survey on the structure, the manufacturing process and the security status of the communication business network of zhejiang province . the author used the theoretic knowledge of the security of information system and the engineering method . and then i analyzed the systemic security risk and security needs of the communication business network of zhejiang from the physics layer, network layer, system layer, application layer and administration layer respectively
論文作者參照國(guó)家對(duì)電子政務(wù)信息系統(tǒng)的安全要求,在對(duì)浙江省交通業(yè)務(wù)網(wǎng)的網(wǎng)絡(luò)、業(yè)務(wù)流程和安全現(xiàn)狀進(jìn)行了廣泛的調(diào)查了解的基礎(chǔ)上,運(yùn)用信息系統(tǒng)安全的理論知識(shí)和工程方法,分別從物理層、網(wǎng)絡(luò)層、系統(tǒng)層、應(yīng)用層及管理層上對(duì)浙江省交通業(yè)務(wù)網(wǎng)系統(tǒng)進(jìn)行了安全風(fēng)險(xiǎn)和安全需求分析,在此基礎(chǔ)上研究了安全技術(shù)和安全服務(wù)的配置原則和方法,設(shè)計(jì)出浙江省交通業(yè)務(wù)網(wǎng)的總體安全方案。 - to solving other security productions " disadvantages, this paper divides the network facility into five levels using artificial immune system's multilayer defence mechanism and fuzzy recognition, such as hardware performance, network data, system processes, system data and application service etc . and this method sets many detective parameters on each level . so using these parameters the method can detect the network's security status and intrusions to protect the whole network
針對(duì)現(xiàn)有產(chǎn)品的這一缺陷,本文根據(jù)仿生學(xué)人工免疫系統(tǒng)中的多層防御機(jī)制結(jié)合模糊數(shù)學(xué)的模糊識(shí)別算法,在網(wǎng)絡(luò)設(shè)備上劃分了硬件性能、網(wǎng)絡(luò)數(shù)據(jù)、系統(tǒng)進(jìn)程、系統(tǒng)數(shù)據(jù)、應(yīng)用服務(wù)等五個(gè)層次,并在每個(gè)層次上設(shè)置了大量的檢測(cè)參數(shù),通過(guò)這些檢測(cè)參數(shù)對(duì)網(wǎng)絡(luò)狀態(tài)和入侵行為進(jìn)行模糊識(shí)別,從而全方位的保護(hù)網(wǎng)絡(luò)及其設(shè)備的安全。