999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

提高網(wǎng)絡(luò)安全,科學(xué)家在努力

2023-03-20 02:16:46重慶
瘋狂英語(yǔ)·新悅讀 2023年2期
關(guān)鍵詞:系統(tǒng)

重慶 龔 勇

主題語(yǔ)境:科技與信息 篇幅:314詞 建議用時(shí):7分鐘

1Network-based technologyhasbecome increasingly widespread,and it is now being used by countless individuals,professionals,and businesses worldwide.Despite the technology's advantages,most network-based systems are highly weak to malicious attacks.The consequences of a malicious attack on network-based systems can be extremely severe and devastating.For instance,an attack on a power utility network could leave millions of individuals and offices without electricity,while attacks on social media networks can lead to the disclosure of user information.

2To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion(入侵)detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.In recent years,machine learning(ML)algorithms(算法)have been found to be particularly promising for automatically detecting attacks and intrusions on a network's functioning.

3A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.Ideally,by analyzing large datasets,researchers should be able to identify the most suitable features for solving a given task using ML tools,and this is also applicable to intrusion detection.

4Researchers at Canadian University Dubai in the UAE have recently developed a new feature selection method that could enable the development of more effective ML-based IDSs.This method,presented in a paper pre-published on arXiv,was found to perform remarkably well when compared with other commonly employed feature selection techniques.“Our goal is to study feature selection in network traffic data with the aim of detecting potential attacks,”Firuz Kamalov,Sherif Moussa,Rita Zgheib and Omar Mashaal,the researchers who carried out the study,wrote in their paper.“We consider various existing feature selection methods and propose a new feature selection algorithm to identify the most effective features in network traffic data.”

Reading

Check

1.What's the function of the two examples mentioned in paragraph 1?

A.To present the power of network-based systems.

B.To show the weaknesses of network-based systems.

C.To explain the variety of malicious attacks.

D.To illustrate the serious results of malicious attacks.

2.How do IDSs improve a network's safety?

A.By preventing malicious attacks.

B.By recognizing malicious attacks.

C.By imitating malicious attacks.

D.By devastating malicious attacks.

3.What's the key to the development of ML-based IDSs?

A.The settlement of tasks.

B.The analysis of datasets.

C.The prediction of the model.

D.The choosing of data features.

Language

Study

Ⅰ.Useful expressions

for instance例如;比如

rely on依靠;依賴

be able to do能夠做……

compare with與……相比較

Ⅱ.Difficult sentences

1.To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點(diǎn),世界各地的計(jì)算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測(cè)系統(tǒng),這類系統(tǒng)可以幫助識(shí)別惡意攻擊,提高網(wǎng)絡(luò)的安全性。

【點(diǎn)石成金】該句的主干為computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs);that could help to identify...safety為that引導(dǎo)的定語(yǔ)從句,修飾先行詞intrusion detection systems,且關(guān)系代詞that在從句中作主語(yǔ);To overcome...systems為不定式結(jié)構(gòu)作目的狀語(yǔ)。

2.A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.基于機(jī)器學(xué)習(xí)的入侵檢測(cè)系統(tǒng)開發(fā)和訓(xùn)練的關(guān)鍵步驟是選擇模型在進(jìn)行預(yù)測(cè)時(shí)可以依賴或關(guān)注的數(shù)據(jù)特征。

【點(diǎn)石成金】該句的主干為A key step is the selection of data features;in the development and training of ML-based IDSs為介詞結(jié)構(gòu)作后置定語(yǔ),修飾A key step;that a model can rely...focus on為that引導(dǎo)的定語(yǔ)從句,修飾先行詞data features,且關(guān)系代詞that在從句中作賓語(yǔ);when making predictions為when引導(dǎo)的時(shí)間狀語(yǔ)從句的省略形式,省略了主語(yǔ)a model和be動(dòng)詞is。

猜你喜歡
系統(tǒng)
Smartflower POP 一體式光伏系統(tǒng)
WJ-700無(wú)人機(jī)系統(tǒng)
ZC系列無(wú)人機(jī)遙感系統(tǒng)
基于PowerPC+FPGA顯示系統(tǒng)
基于UG的發(fā)射箱自動(dòng)化虛擬裝配系統(tǒng)開發(fā)
半沸制皂系統(tǒng)(下)
FAO系統(tǒng)特有功能分析及互聯(lián)互通探討
連通與提升系統(tǒng)的最后一塊拼圖 Audiolab 傲立 M-DAC mini
一德系統(tǒng) 德行天下
PLC在多段調(diào)速系統(tǒng)中的應(yīng)用
主站蜘蛛池模板: 五月天久久综合国产一区二区| 欧美区一区二区三| 男人天堂伊人网| 国产主播在线一区| 国产91熟女高潮一区二区| аv天堂最新中文在线| a毛片免费看| 国产性生大片免费观看性欧美| 一本色道久久88综合日韩精品| 国产本道久久一区二区三区| 91视频青青草| 亚洲无码一区在线观看| 国产h视频免费观看| 久久黄色免费电影| 国产成人三级在线观看视频| 国产福利微拍精品一区二区| 国产美女无遮挡免费视频网站 | 日韩精品成人在线| 噜噜噜久久| 日韩欧美高清视频| 国产va欧美va在线观看| 青青青国产视频| 亚洲日韩AV无码一区二区三区人| 国产精品自在线天天看片| 日本高清免费一本在线观看| 一级片免费网站| 干中文字幕| 最新国产麻豆aⅴ精品无| 国禁国产you女视频网站| 亚洲天堂区| 亚洲视频四区| 亚洲AV无码精品无码久久蜜桃| 91国内在线视频| 91外围女在线观看| 22sihu国产精品视频影视资讯| 国产欧美高清| 欧美性久久久久| 五月激情婷婷综合| 美女内射视频WWW网站午夜| 国产一区二区三区精品久久呦| 国产成人免费| 奇米影视狠狠精品7777| 91精品网站| 久久国产精品麻豆系列| 国产H片无码不卡在线视频| 一区二区三区国产精品视频| 国产麻豆aⅴ精品无码| 一级不卡毛片| 亚洲成人动漫在线观看| 亚洲成人在线播放 | 毛片a级毛片免费观看免下载| 国产一级二级三级毛片| 高清无码一本到东京热| 99久久国产综合精品女同| av一区二区三区在线观看| 波多野结衣一区二区三区四区视频| 亚洲第一黄片大全| 天堂中文在线资源| 婷婷亚洲天堂| 色有码无码视频| 六月婷婷精品视频在线观看| 国产福利大秀91| 成人在线视频一区| 亚洲成人高清在线观看| 伊人中文网| 国产美女自慰在线观看| 国产精品亚洲五月天高清| 91啪在线| 少妇人妻无码首页| 欧美成一级| 国产成人精品18| 国产成人狂喷潮在线观看2345| 色综合色国产热无码一| 国产一区二区三区日韩精品| 免费观看男人免费桶女人视频| 国产毛片高清一级国语 | 日韩成人在线一区二区| 亚洲日韩精品欧美中文字幕| 538国产在线| 色偷偷一区二区三区| 日本在线国产| 成人在线天堂|