网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_intrusion-detection
释义

intrusion detection

collocation in English

meanings of intrusionand detection


These words are often used together. Click on the links below to explore the meanings. Or, see other collocations with intrusion or detection.
intrusion
noun[C or U]
uk /ɪnˈtruː.ʒən/ us /ɪnˈtruː.ʒən/
an occasion when someone goes into a place or situation where they are not wanted or expected ...
See more at intrusion
detection
noun[U]
uk /dɪˈtek.ʃən/ us /dɪˈtek.ʃən/
the fact of noticing or ...
See more at detection


Examples of intrusion detection


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The inner fence is equipped with a perimeter intrusiondetection system and a road for patrol vehicles runs along the outer fence.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When using shellcode to exploit programs, it can be caught by intrusiondetection systems.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
We are exploring the use of fuzzy data mining and concepts introduced by the semantic web to operate in synergy to perform distributed intrusiondetection.
Moreover, specifying an ontological representation decouples the data model defining an intrusion from the logic of the intrusiondetection system.
There are numerous attack taxonomies proposed for use in intrusiondetection research.
There is little, if any, published research formally defining ontologies for use in intrusiondetection.
It should be noted that an intrusiondetection system running exclusively at either host will not detect this multi-phased and distributed attack.
Allen et al. state that intrusiondetection is an immature discipline and has yet to establish a commonly accepted framework.
The overarching philosophy driving intrusiondetection is that, due to their static nature, intrusion prevention techniques such as firewalls and routing filter policies fail to stop many types of attack.
In applying ontologies to the problem of intrusiondetection, the power and utility of the ontology is not realised by the simple representation of the attributes of the attack.
Undercoffer et al. address the problem of intrusiondetection in networks and the use of ontologies and logical reasoning methods in order to solve this problem more effectively.
Another critical security measure utilised by several regional and international airports is the use of fiber optic perimeter intrusiondetection systems.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Investigators often only have material to examine if packet filters, firewalls, and intrusion detection systems were set up to anticipate breaches of security.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Intrusiondetection systems are often repetitive and can be avoided by anticipating their predictable patterns.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It has experimentally been shown to work very well in numerous setups, often outperforming the competitors, for example in network intrusiondetection.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Other security services are included by default as well, such as intrusiondetection, anti-virus, network management and auditing and reporting tools.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The main differences are, unlike intrusiondetection systems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Honeynets and honeypots are usually implemented as parts of larger network intrusiondetection systems.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It can be used as an audit tool and a host intrusiondetection system tool.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
For example, intrusiondetection software is tested using synthetic data.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ongoing research in integrity and intrusiondetection promise to fill some of this gap.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The log can double as intrusiondetection tool, logging all accesses including illegal access attempts.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition of intrusion
Go to the definition of detection
See other collocations with intrusion
See other collocations with detection
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/22 22:49:48