Examples of using Network-based in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The attacks are an international exploitation of network infrastructure devices- such as, routers, switches, firewalls and Network-based Intrusion Detection Systems(NIDS).
The Global Compact is not a regulatory instrument, it is a voluntary initiative with a network-based character.
Distributed denial-of-service(DDoS) is considered one of the‘original' network-based cyberattacks and for good reason.
The European Medicines Agency parallel text corpus was used as the basis for training of neural and statistical network-based translation systems.
The multi-gigabit performance and enhanced network capacity that is delivered through WiGig will dramatically alter the way people access and use network-based resources.
The most common methods of attack are phishing(69%), network-based attacks(54%) and malware attacks(40%).
To avoid unnecessary duplication in a network-based video recorder environment, the system 10 may provide network-based video recording capabilities by using virtual copies or recordings.
As a result, old network-based worms such as Downad(aka Conficker), for instance, were found to have high detections in these environments.
Today's data network should provide the reliability, quality of service, and the flexibility to support various applications like voice, video and other network-based services.
This will eliminate the need for operation and maintenance of over 140 local area network-based software application suites for UNDP alone; partner organizations will similarly benefit.
Network-Based Solutions to Security.
The approximate location(network-based).
A network-based WAF is generally hardware-based.
A network-based WAF is typically hardware-based.
We also pioneered network-based physical access control.
Network-based intrusion detection system(NIDS).
First, LoT security fundamentally requires network-based enforcement.
Network-based business model of variable data printing systems.
The traditional network-based security perimeter is obsolete.
What are network-based, host-based, and cloud-based WAFs?