说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 入侵证据
1.
The Invasion of Evidence Collection Study Based on Windows System
基于Windows系统的入侵证据收集研究
2.
Intrusive Detection system based on Dempster-Shafer identity theory;
基于数据融合中Dempster—Shafer证据理论的入侵检测技术
3.
On Means of Obtaining Electronic Evidence after the Criminal Invasion of the Computer System;
计算机系统遭到犯罪入侵后的电子证据取证
4.
Research on the Network Intrusion Forensics System Base on Data Mining;
基于数据挖掘的网络入侵取证系统研究
5.
Network Intrusion Early Warning Model Based on D-S Evidence Theory;
基于D-S证据理论的网络入侵预警模型
6.
Multi-agent distributed intrusion detection system model based on evidence reasoning
基于证据推理的多agent分布式入侵检测系统模型
7.
Analysis of the Electrons Evidence Obtainment Based on a Case of Web Site Intrusion
从一起网站被入侵案件谈电子证据的获取
8.
Research on Network Anomaly Intrusion Detector Based on Extended Dempster-Shafer Evidence Fusion Algorithm;
基于扩展D-S证据融合算法的网络异常入侵检测研究
9.
The comparison of Two kind of fusion algorithm based on the D-S evidence theory in IDS;
两种入侵检测系统D-S证据理论融合算法的比较
10.
Study on Intrusive Rocks Forming Period and Stages Division in Ludong Area
鲁东地区侵入岩形成时代和期次划分——锆石SHRIMP U-Pb年龄的证据
11.
Research and Implementation of the Intrusion Detector for Intrusion Tolerant Databases;
入侵容忍数据库入侵检测器的研究与实现
12.
Research on Database Intrusion Detection Based on Data Mining
基于数据挖掘的数据库入侵检测研究
13.
So he had plenty of time to hack into the system Local PD is looking for the crashed plane
那他有充足的时间入侵电脑系统来销毁证据 当地警方正在塔台方圆10英里内
14.
An Intrusion Reconstruction System of Computer Forensics-Design and Implementation of Network Forensics and Analysis System;
网络入侵取证重构—网络入侵取证系统的设计和实现
15.
Such truncation is evidence of an erosional hiatus.
这种削蚀现象是侵蚀沉积间断的证据。
16.
(b) to preserve relevant evidence in regard to the alleged infringement.
(b)保存被诉为侵权的有关证据。
17.
Evidence Rules Particularity of Environmental Civil Infringement Proceedings;
环境侵权民事诉讼证据规则的特殊性
18.
The Problem of Evidences in the Computer Software Copyright Tort Actions
计算机软件版权侵权诉讼的证据问题