词汇 | example_english_intrusion-detection |
释义 | intrusion detectioncollocation in Englishmeanings of intrusionand detectionThese words are often used together. Click on the links below to explore the meanings. Or, see other collocations with intrusion or detection. intrusion noun[C or U] uk /ɪnˈtruː.ʒən/ us /ɪnˈtruː.ʒən/ an occasion when someone goes into a place or situation where they are not wanted or expected ... See more at intrusion detection noun[U] uk /dɪˈtek.ʃən/ us /dɪˈtek.ʃən/ the fact of noticing or ... See more at detection Examples of intrusion detectionThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. The inner fence is equipped with a perimeter intrusiondetection system and a road for patrol vehicles runs along the outer fence. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When using shellcode to exploit programs, it can be caught by intrusiondetection systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. We are exploring the use of fuzzy data mining and concepts introduced by the semantic web to operate in synergy to perform distributed intrusiondetection. Moreover, specifying an ontological representation decouples the data model defining an intrusion from the logic of the intrusiondetection system. There are numerous attack taxonomies proposed for use in intrusiondetection research. There is little, if any, published research formally defining ontologies for use in intrusiondetection. It should be noted that an intrusiondetection system running exclusively at either host will not detect this multi-phased and distributed attack. Allen et al. state that intrusiondetection is an immature discipline and has yet to establish a commonly accepted framework. The overarching philosophy driving intrusiondetection is that, due to their static nature, intrusion prevention techniques such as firewalls and routing filter policies fail to stop many types of attack. In applying ontologies to the problem of intrusiondetection, the power and utility of the ontology is not realised by the simple representation of the attributes of the attack. Undercoffer et al. address the problem of intrusiondetection in networks and the use of ontologies and logical reasoning methods in order to solve this problem more effectively. Another critical security measure utilised by several regional and international airports is the use of fiber optic perimeter intrusiondetection systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Investigators often only have material to examine if packet filters, firewalls, and intrusion detection systems were set up to anticipate breaches of security. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Intrusiondetection systems are often repetitive and can be avoided by anticipating their predictable patterns. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It has experimentally been shown to work very well in numerous setups, often outperforming the competitors, for example in network intrusiondetection. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Other security services are included by default as well, such as intrusiondetection, anti-virus, network management and auditing and reporting tools. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The main differences are, unlike intrusiondetection systems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Honeynets and honeypots are usually implemented as parts of larger network intrusiondetection systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It can be used as an audit tool and a host intrusiondetection system tool. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For example, intrusiondetection software is tested using synthetic data. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Ongoing research in integrity and intrusiondetection promise to fill some of this gap. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The log can double as intrusiondetection tool, logging all accesses including illegal access attempts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Want to learn more? Go to the definition of intrusion Go to the definition of detection See other collocations with intrusion See other collocations with detection |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。