Specialty Example Sentence Terms for Computer Systems

Компьютерные системы

|Поиск предложений по терминологии специальности

Systems Engineering  |Системная инженерия

access control
access process
access system
access table
acm conference
additional data
additional evidence
advantageously arranged
alert correlator
alert distributor
algorithm table
allegedly dated
allocated computer components
allows individuals
analysis engine
analysis engine configured
analyzing data traffic occurring
analyzing post-mortem information
analyzing post-mortem information specifying
anomaly detection
apparatus method
applet server
application includes
application programs
application server
area network
area networks
attack associated
authentication credentials
authentication system
automatically evaluated
autonomic element
autonomic elements
autonomous computer
autonomous computer agent
autonomous computer agents
autonomous service
autonomous service located
avionics zone
basic features
blocked during
botnet detection
business needs
business rules
cax application
cax server
cd access process
certain commands
change state table
child process
child processes
client application
client computer
client computers
client computers
client device
client devices
client network
client network system
client network system defense training exercise
client networks
closed test environment
cloud computing
cloud service provider
cloud services
code module
code module includes platform-independent java byte codes
code module sent
code modules
collaborating system
collaborative cax editing
collaborative cax editing system
collaborative cax server
collaborative data store
collected data
communication network
communication system
communications network
compliance management
compliance management device
component continues
component returns
components thereby allocated during
compression scheme
computed signature
computer agent
computer communications
computer components
computer components thereby allocated
computer configuration
computer data
computer industry
computer network
computer network components
computer network data
computer network security
computer networks
computer networks sold
computer program
computer programs
computer readable program
computer readable storage medium
computer science
computer security
computer security conference
computer system
computer systems
computer systems based
computer systems sold
computer user
computer users
computer virus
computer viruses
computer-implemented method
computing devices
computing environment
computing nodes
computing system
conference proceedings
configuration changes
configuration manager
configuration parameter
configuration parameters
configuration process
configuring computer systems
content provider
control protocol
cursor location
cursor movement
cursor movement captor
cursor synchronizer
dashboard application
data access
data base
data definition
data definitions
data display
data entries
data entry
data flow requirements
data instance
data instances
data packet
data packets
data place
data processing
data processing
data processing needs
data processing system
data processor
data regarding
data relative
data set
data source
data sources
data stations
data storage
data structure
data traffic
data traffic along
data transfer
data transmission
data types
data unit
data unit type
date nov
debugging computer system
decision block
decoy information
defense training
defense training exercise
described above
described system
detect creation
detecting computer
detecting computer viruses
detecting intrusion
detecting malicious
detecting malicious domain
detecting malware
detecting masquerade attacks
detecting network
determine whether
determining data flow requirements
display adapter
display panel
display screen
display system
displaying computer network data
distributed computing
distributed computing environment
distributed computing system
distributed intrusion detection system
distributed network
distributed system
distributed system
distributed system security
distributed systems
distributed systems security
dynamic changes
dynamic distributed computing
electronic data
electronic data processor
electronic maintenance document
email body
embodiment described herein
emulating production operations
engineering object
engineering object encoded
enterprise network
enterprise network agent
entries relative
error recovery
error recovery logic module
executing code module
execution environment
existing system
external data
external management entity
fault-finding logic tree
feature identifier
feature reference
fees due
file name
file system
filed dec
gateway device
generated user intent model
generic compute task
grant limited access rights
graphic element
gui system
hardware inventory
hardware resources
host machine
host system
identifying whether
ieee computer
ieee network
ieee security
ieee symposium
impact value
incoming traffic
infected attachment
infected data
information processing
information related
information security
information security management
information system
information systems
information systems security conference
intended recipient
interactive data entries
interactive dialog screen
interactive display computer
interface switch
intermediate acquaintance
intermediate acquaintances
international conference
international search
international virus
internet protocol
internet security systems
internet worm
intrusion attempt
intrusion attempt correlates
intrusion detect
intrusion detection
intrusion detection component
intrusion detection system
intrusion detection system comprises
intrusion detection systems
invention comprises
ip address
java application
java virtual machine
java virtual machine located
key token
keyboard action
language construct
last cursor location
logic module
machine learning
mainframe computing
maintenance computer system
maintenance document
maintenance document associated
maintenance document associated respectively
malicious portion thereof
malicious programs
malicious software
malware analysis
malware detection
managed information
managed information processor associated
management device
management system
masquerade attack
masquerade attack based
masquerade attack detection
mathematical formula
memory space
message queue
message queues
method comprising
method includes generating
minimal client device
model generator
module automatically
monitoring computer
monitoring computer user behavior
monitoring system
movement piece
movement pieces
multiple access
network access
network administrator
network analyzer
network application
network applications
network architecture
network authentication
network component
network components
network computer
network configuration
network data
network device
network devices
network information
network intrusion detection
network isolation application
network isolation application executing
network layout
network management
network management system
network monitoring
network security
network security management
network server
network services
network system
network traffic
new program
new rules
next configuration parameter
non-secure production network
normal data
normal registry activity
normal registry behavior
object encoded
one-way communication
one-way data
one-way data structure
open zone
operating system
operating systems
operations log
patent application
pending-access request
performance metrics
personal relationship
personal relationships
platform-independent java byte codes
post-mortem information
post-mortem information specifying
potential reference
potential references
pre-defined times
present invention comprises
probabilistic assessments
probabilistic model
process flow diagram
process requests
processing data
program code
prompting network purchasers
proprietary cax application
proprietary feature
proprietary format
proprietary object
proprietary object file
proxy server
purchasers during
receive results operation
reconfiguring persona
reference search
registry access
registry accesses
registry activity
remote access
remote command
remote computer system
remote computer system executes
remote procedure
remote procedure call
remote site
remote sites
request data
request data component
requested applet
requested file
requests table
required hardware resources
response options
rule-based engine
running time
second computer
second data
second electronic data
second electronic data processor
second intrusion attempt
second memory space
second module
second plurality
second software module accommodated
secure bi-directional communication conduit
secure bidirectional communication conduit
secure production network
secure remote access
security co-processor
security management
security policy
security service
security symposium
security system
security systems
selected configuration parameter
selected level
selected network device
selected network devices
selected time period
self-contained message
self-contained messages
server computer
server computer
service attacks
service networks
service provider
service system
simulated computer network
simulated via software
simulating computer networks
smallest permissible data packet
smallest permissible packet length
social network
social networking
social networking system
social networks
software application
software applications
software components
software computer components
software module
software module accommodated
software problems
sold computer components
source state table
specific remote site
sri international
steps comprising
storage device
storage devices
stored information
stored information related
sub-set paradigm
subsequently described
supporting secure remote access
synchronization module
system allows
system architecture
system comprises message queues
system file
system files
system management program
system needs solution
system needs solutions
system operates
system security symposium
system services
systems security symposium
tearing down
telecommunications signals
test computer network security
test data
test environment
test network
third party
time period
time period exceed
time value
traffic engineering
transmitting collected data regarding
unauthorized changes
usb device
usenix security symposium
usenix symposium
user access
user actions
user activities
user authentication
user behavior
user entries
user includes
user information
user intent
user intent model
user interactive display computer process
user interface
user’s computer
video data
video signals
virtual environment
virtual machine
virtual network
virus detection
virus detection via
vulnerability analysis
vulnerability assessment
vulnerability assessment component
web application
web application server
web browser
web page
web server
wireless network
wireless networks
worm analyscomputer systems
worm detection