- detection system
- система обнаружения (неисправностей)
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
Poseidon drowning detection system — The Poseidon drowning detection system is a computer aided drowning detection system. The system is commonly installed in bathing areas, such as municipal swimming baths, waterparks, therepeutic baths, and other places where there is standing… … Wikipedia
Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) … Wikipedia
Intrusion Detection System — Ein Intrusion Detection System (IDS) bzw. Angrifferkennungssystem ist ein System zur Erkennung von Angriffen, die gegen ein Computersystem oder Computernetz gerichtet sind. Das IDS kann eine Firewall ergänzen oder auch direkt auf dem zu… … Deutsch Wikipedia
Intrusion Detection System — Système de détection d intrusion Un système de détection d intrusion (ou IDS : Intrusion Detection System) est un mécanisme destiné à repérer des activités anormales ou suspectes sur la cible analysée (un réseau ou un hôte). Il permet ainsi… … Wikipédia en Français
Network intrusion detection system — A Network Intrusion Detection System (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by Network Security Monitoring (NSM) of… … Wikipedia
Anomaly-based intrusion detection system — An Anomaly Based Intrusion Detection System, is a system for detecting computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous . The classification is based on heuristics or rules, rather than … Wikipedia
Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… … Wikipedia
Intrusion detection system evasion techniques — are modifications made to attacks in order to prevent detection by an Intrusion Detection System (IDS). Almost all published evasion techniques modify network attacks. The 1998 paper [http://citeseer.ist.psu.edu/ptacek98insertion.html Insertion,… … Wikipedia
Target Acquisition Minefield Detection System — (ASTAMIDS) is the latest weapon in the fight against improvised explosive devices (IED). It will provide a Unit of Action (UA) asset that can be used in Tactical Operations in day or night to detect and locate surface obstacles and recently… … Wikipedia
Autonomous Detection System — An Autonomous Detection Systems (ADS), also called biohazard detection systems, or autonomous pathogen detection systems, are designed to monitor air in the environment and to detect the presence of airborne chemicals, toxins, pathogens, or… … Wikipedia