intruder detection probability

intruder detection probability
веpоятность обнаружения нарушителя

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "intruder detection probability" в других словарях:

  • Intruder detection — In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This techniques try to identify the person analyzing their computational behaviour.This concept is not yet very extended and tend to… …   Wikipedia

  • Life Sciences — ▪ 2009 Introduction Zoology       In 2008 several zoological studies provided new insights into how species life history traits (such as the timing of reproduction or the length of life of adult individuals) are derived in part as responses to… …   Universalium

  • cosmos — /koz meuhs, mohs/, n., pl. cosmos, cosmoses for 2, 4. 1. the world or universe regarded as an orderly, harmonious system. 2. a complete, orderly, harmonious system. 3. order; harmony. 4. any composite plant of the genus Cosmos, of tropical… …   Universalium

  • chemoreception — chemoreceptive /kee moh ri sep tiv, kem oh /, adj. /kee moh ri sep sheuhn, kem oh /, n. the physiological response to chemical stimuli. [1915 20; CHEMO + RECEPTION] * * * Sensory process by which organisms respond to external chemical stimuli, by …   Universalium

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Measurement and signature intelligence — (MASINT) is a branch of intelligence gathering activities. MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more… …   Wikipedia

  • PaX — In computer security, PaX is a patch for the Linux kernel that implements least privilege protections for memory pages. The least privilege approach allows computer programs to do only what they have to do in order to be able to execute properly …   Wikipedia

  • Motion detector — A motion detector attached to a garage A motion detector is a device for motion detection. That is, it is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to… …   Wikipedia

  • Location estimation in sensor networks — Location estimation in wireless sensor networks is the problem of estimating the location of an object from a set of noisy measurements, when the measurements are acquired in a distributedmanner by a set of sensors.MotivationIn many civilian and… …   Wikipedia

  • Defence of the Reich — Part of Campaigns of World War II …   Wikipedia

  • FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»