- intrusion detection processing
- działanie systemu wykrywania infiltracjiprzetwarzanie służące do wykrywania włamań
English-Polish dictionary of Electronics and Computer Science. 2013.
English-Polish dictionary of Electronics and Computer Science. 2013.
Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… … Wikipedia
Détection de personne — Un exemple de détection de personnes sur une voie de circulation La détection de personne est un domaine de la vision par ordinateur consistant à détecter un humain dans une image numérique. C est un cas particulier de détection d objet, où l on… … Wikipédia en Français
Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… … Wikipedia
Change detection — In statistical analysis, change detection tries to identify changes in the probability distribution of a stochastic process or time series. In general the problem concerns both detecting whether or not a change has occurred, or whether several… … Wikipedia
Diver Detection Sonar — (DDS) systems are sonar and acoustic location systems employed underwater for the detection of divers and submerged swimmer delivery vehicles (SDVs). The purpose of this type of sonar system is to provide detection, tracking and classification… … Wikipedia
Motion detection — is a process of confirming a change in position of an object relative to its surroundings or the change in the surroundings relative to an object. This detection can be achieved by both mechanical and electronic methods. In addition to discrete,… … Wikipedia
Система обнаружения вторжений — (СОВ) программное или аппаратное средство, предназначенное для выявления фактов неавторизованного доступа в компьютерную систему или сеть либо несанкционированного управления ими в основном через Интернет. Соответствующий английский… … Википедия
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Military equipment of Turkey — The military equipment of Turkey includes a wide array of arms, artilleries, large surface vessels, cannons, armored vehicles, mortars, unmanned vehicles and many different equipments. Contents 1 Historical development 1.1 General 1.2 1923 1950 … Wikipedia
Distributed firewall — A firewall is system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect inside network from outside network. It may be a hardware device or a software… … Wikipedia
система — 4.48 система (system): Комбинация взаимодействующих элементов, организованных для достижения одной или нескольких поставленных целей. Примечание 1 Система может рассматриваться как продукт или предоставляемые им услуги. Примечание 2 На практике… … Словарь-справочник терминов нормативно-технической документации