IDS



abbr.
Identification Section 标识部分;
权威例句
Danger Theory: The Link between AIS and IDS?The inventory for depressive symptomatology (IDS): Preliminary findings
The Inventory of Depressive Symptomatology (IDS): psychometric properties
BotHunter: detecting malware infection through IDS-driven dialog correlation
A simple method for the isolation and purification of total ipids from animal tissues
The Inventory of Depressive Symptomatology (IDS): Clinician (IDS-C) and Self-Report (IDS-SR) ratings of depressive symptoms
Testing Intrusion detection systems: a critique of the 1998 and 1999, DARPA IDS evaluations as performed by Lincoln Laboratory
The Inventory of Depressive Symptomatology, Clinician Rating (IDS-C) and Self-Report (IDS-SR), and the Quick Inventory of Depressive...
Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established whe...
Clinicopathological staging for colorectal cancer: an International Documentation System (IDS) and an International Comprehensive An...
1. All those areas are essentially controlled and regulated by IDS itself; we can hardly do anything about them.
所有那些区域基本上都是由IDS本身来控制和管理的;我们几乎不用做任何事情。
www.ibm.com
2. There are several problems that low detection veracity rate, slow detection speed and bad self adaptability in traditional IDS.
传统的入侵检测系统存在着检测准确率低、检测速度慢和自适应性差等问题。
dj.iciba.com
3. Because cluster file systems cause unnecessary performance and administration overhead for operation of IDS, this article uses SAN as the means for storage of chunks.
因为集群文件系统会给IDS操作带来不必要的性能开销和管理负担,本文使用SAN作为区块的存储方法。
www.ibm.com
4. If poll threads are not configured, IDS will start one poll thread.
如果未配置轮询线程,则IDS将启动一个轮询线程。
www.ibm.com
5. IDS is the second security gate behind the firewall, and it is also the important part of network security protection architecture.
入侵检测系统是防火墙后的第二道安全闸门,是网络安全防护体系结构的重要组成部分。
dict.cnki.net
6. But it has no united IDS test method and evaluation standard by far.
但是到目前为止没有统一的IDS测试方法和评估标准。
dict.cnki.net
7. Since it is the combo of IDS and justice parsing technique, it will be instructive for the dynamic forensics of computer crime.
该模型将入侵检测系统与司法分析技术有机结合,它的提出对计算机犯罪的动态取证有一定指导意义。
dict.cnki.net
8. So the research for IDS means the research for other techniques too.
因此,入侵检测的研究也包含了对其它技术的研究。
dict.cnki.net
9. One instance of IDS should be configured and running with socket connection.
应该配置一个IDS实例并通过套接字连接运行。
www.ibm.com
10. If this error occurs, synchronize the clocks in the IDS client, server, and KDC machines.
如果发生这种错误,请在IDS客户机、服务器和KDC机器上同步时钟。
www.ibm.com
11. To add a IDS server group, provide a server group name and a server group password of your choice.
要想添加一个IDS服务器组,需要提供您选择的服务器组名和服务器组密码。
www.ibm.com
12. The figure shows backup agents for both IDS and DB2, but you cannot use both agents on the same machine.
该图显示了针对IDS和DB2 的备份代理,但您不能在同一个机器上同时使用它们。
www.ibm.com
13. Before IDS deletes or modifiesy a database record, it will take a snapshot of the original record and store its original value in case the transaction fails.
在IDS删除或修改一条数据库记录之前,它将捕获这一原始记录的快照并存储其原始值,以防事务失败。
www.ibm.com
14. Inter processor communications or messages portion is allocated during IDS initialization if you configure at least one of your connections as an IPC shared-memory connection.
如果您至少将一个连接配置为IPC共享内存连接,那么在初始化IDS时将分配处理器间的通信或消息区。
www.ibm.com
15. Since it comes bundled with IDS, you can easily use it to execute queries and retrieve information from the database.
因为它是与IDS绑定的,所以您能够轻松地使用它来执行查询和从数据库获取信息。
www.ibm.com
16. Fill all the tabs with the information from your IDS instance.
在所有的选项卡中填写来自IDS实例的信息。
www.ibm.com
17. Without the IDS 9.40 new rename restore feature, you may not able to accomplish this architecture change and reduce your total downtime in a cutover process.
没有IDS9.40新的重新命名恢复功能,您就可能无法在转换过程中完成此体系结构更改和减少总的停机时间。
www.ibm.com
18. These tools are used for moving data from one IDS instance to another and to keep a backup of the data as flat files.
这些工具用于将数据从一个IDS实例移动到另一个实例,并保存扁平文件格式的数据备份。
www.ibm.com
19. IDS is a versatile relational database server that is powered with a wealth of features. It helps every database user, from an application user to an administrator, with complex activities.
IDS是一种强大的关系数据库服务器,它提供了许多特性,可以帮助每个数据库用户(从应用程序用户到管理员)完成复杂的活动。
www.ibm.com
20. Now, IDS also supports this feature to allow you to easily perform your data load and unload operations with highest performance and flexibility.
现在,IDS也支持这个特性,允许您轻松执行数据加载和卸载操作,从而获取最高的性能和最大的灵活性。
www.ibm.com
21. A prerequisite for adding servers to an ER domain is that each standalone IDS server must be running with configured SQLHOSTS files and connected to a network.
向一个ER域添加服务器的一个先决条件是:每个独立IDS服务器必须使用已配置的SQLHOSTS文件运行并连接到一个网络。
www.ibm.com
22. But practically, the maximum number of bins depends upon the disk space and any limitations imposed by the IDS.
但是基本上,容器的最大数量取决于磁盘空间和IDS施加的任何限制。
www.ibm.com
23. DB2 and IDS databases offer comprehensive audit facilities to capture all the information your auditors might need to ensure compliance with business controls.
DB2和IDS数据库提供全面的审计工具,能够捕捉到审计员需要用于确保遵从业务控制的所有信息。
www.ibm.com
24. As an example, IDS monitors and records significant events on a specific computer or from the network examining data and providing an "after the fact" forensic ability to identify suspect activity.
比如说,IDS监视并记录某一特定计算机或来自具有调查数据并能提供识别可疑活动“犯罪之后”的侦破能力的网络上的重要事件。
www.shumo.com
25. Servers must be the same IDS version and run on the same operating system, hardware, and disk architecture.
服务器必须使用相同的IDS版本并运行在相同的操作系统、硬件和磁盘架构上。
www.ibm.com
26. These files can be in some specific form (discussed later in this article) that is understood by the IDS so that it can be accessed using SQL queries.
这些文件可能采用某种IDS能够理解的形式(本文将在稍后讨论),以便可以通过SQL查询访问。
www.ibm.com
27. The introduction of external tables within the IDS server fulfils the requirement and provides better performance.
IDS服务器中引入的外部表满足了这个需求,并且改善了性能。
www.ibm.com
28. Instance creation in IDS uses a set of environment variables and configuration parameters defined in a file pointed by the ONCONFIG environment variable.
在IDS 中创建实例要使用一组环境变量和配置参数,这些内容都在ONCONFIG环境变量指定的文件中做了定义。
www.ibm.com
29. IDS also provides an option to increase the number of locks acquired dynamically.
IDS还提供了一个选项动态增加获得的锁的数量。
www.ibm.com
30. You can now set the amount of time, in seconds, that IDS has to recover from a problem after you restart the server by creating RTO policy.
现在可以通过创建RTO策略,设置在重新启动服务器之后,经过多长时间(单位为秒)IDS必须从一个问题恢复过来。
www.ibm.com
31. Do Not Modify Mat IDs or Material
不改变材质或材质ID号
-- 来源 -- 英汉 - 翻译参考[网络]
32. In these cases, you should be able to spot the patterns of large-scale scanning in your IDS logs.
在这些情况下,你应该要能够辨认海量的ids日志信息。
-- 来源 -- www.nod32club.com
33. "[ BAC99] Simply put, IDS tools allow for complete supervision of networks, regardless of the action being taken, such that information will always exist to determine the nature of the security incident and its source.
简单的说,ids工具可以对网络(行)整性监测管理,无论(侵)为是否被采取(是否有入侵行为发生)以至于判别安全事件的类别和来源的信息将会被一直存在。
-- 来源 -- bbs.bitscn.com
34. Here are our identifications. Or, Here are our IDS.)
这是我们的工作证件。
-- 来源 -- 英汉 - 翻译样例 - 口语
35. IDS (intrusion detection system)
入侵检测系统,[港]入侵侦测系统
-- 来源 -- 英汉 - 翻译样例 - 行业
36. Simulating hack attack can be used to evaluate detection accuracy and false alarm rate of as Intrusion Detection System(IDS),so that can improve its performance.
通过模拟黑客攻击,可以对ids进行性能评估,测试它们的检测率、误报率,从而进一步完善其性能。
-- 来源 -- 网友提供
37. Are there people in prison who were convicted on the basis of faulty fingerprint IDs?
有人因为错误的指纹鉴定结果而被关进监狱吗?
-- 来源 -- science - 汉英
38. IDS can detect intrusion or activity which was directed against system by person or program, at the same time, it can keep watch on misuse of system resource by empower person.
ids能够检测未授权对象(人或程序)针对系统的入侵企图或行为(Intrusion),同时监控授权对象对系统资源的非法操作(Misuse)。
-- 来源 -- 网友提供
39. Most intrusion detection systems (IDS) today lack the ability to detect both known and unknown intrusions. Even a very slight variation from known intrusions will go undetected thus rendering the IDS ineffectiveness.
目前大多数入侵检测系统(IntrusionDetectionSystem,ids)没有兼备检测已知和未知入侵的能力,甚至不能检测已知入侵的微小变异,效率较低。
-- 来源 -- 网友提供
40. Fire wall is an important element in network safety. However,because of the defects of firewall itself,IDS system is more and more becoming a necessary and benefitial compliment to fire wall.
防火墙是网络安全的重要一环,但由于其自身机制的缺陷,ids系统越来越成为对防火墙的必要的、有益的补充.
-- 来源 -- 网友提供
IDS




