亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        The efforts of computer scientists提高網(wǎng)絡(luò)安全,科學(xué)家在努力

        2023-07-28 09:18:17龔勇
        瘋狂英語·新閱版 2023年2期
        關(guān)鍵詞:中作點石成金代詞

        龔勇

        為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點,世界各地的計算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測系統(tǒng),提高網(wǎng)絡(luò)的安全性。

        主題語境:科技與信息 篇幅:314詞 建議用時:7分鐘

        1 Networkbasedtechnology has becomeincreasingly widespread, and it is now beingused by countless individuals, professionals, andbusinesses worldwide. Despite the technologysadvantages, most networkbasedsystems arehighly weak to malicious attacks. The consequencesof a malicious attack on networkbasedsystems can be extremely severe and devastating. For instance, an attack on a power utilitynetwork could leave millions of individuals and offices without electricity, while attacks onsocial media networks can lead to the disclosure of user information.

        2 To overcome the weaknesses of network?based systems, computer scientists world?wide have been trying to develop advanced intrusion (入侵) detection systems (IDSs)that could help to identify malicious attacks, increasing a network s safety. In recentyears, machine learning (ML) algorithms (算法) have been found to be particularly promisingfor automatically detecting attacks and intrusions on a networks functioning.

        3 A key step in the development and training of ML?based IDSs is the selection ofdata features that a model can rely on or focus on when making predictions. Ideally, byanalyzing large datasets, researchers should be able to identify the most suitable featuresfor solving a given task using ML tools, and this is also applicable to intrusion detection.

        4 Researchers at Canadian University Dubai in the UAE have recently developed anew feature selection method that could enable the development of more effective MLbasedIDSs. This method, presented in a paper prepublishedon arXiv, was found to perform remarkably well when compared with other commonly employed feature selectiontechniques.“Our goal is to study feature selection in network traffic data with the aim ofdetecting potential attacks,” Firuz Kamalov, Sherif Moussa, Rita Zgheib and OmarMashaal, the researchers who carried out the study, wrote in their paper.“We considervarious existing feature selection methods and propose a new feature selection algorithm toidentify the most effective features in network traffic data.”

        Reading Check

        1. Whats the function of the two examples mentioned in paragraph 1?

        A. To present the power of networkbased systems.

        B. To show the weaknesses of networkbased systems.

        C. To explain the variety of malicious attacks.

        D. To illustrate the serious results of malicious attacks.

        2. How do IDSs improve a networks safety?

        A. By preventing malicious attacks.

        B. By recognizing malicious attacks.

        C. By imitating malicious attacks.

        D. By devastating malicious attacks.

        3. Whats the key to the development of MLbased IDSs?

        A. The settlement of tasks.

        B. The analysis of datasets.

        C. The prediction of the model.

        D. The choosing of data features.

        Language Study

        Ⅰ. Useful expressions

        for instance 例如;比如

        rely on 依靠;依賴

        be able to do 能夠做……

        compare with 與……相比較

        Ⅱ. Difficult sentences

        1. To overcome the weaknesses of networkbasedsystems, computer scientists worldwidehave been trying to develop advanced intrusion detection systems (IDSs) that couldhelp to identify malicious attacks, increasing a networks safety. 為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點,世界各地的計算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測系統(tǒng),這類系統(tǒng)可以幫助識別惡意攻擊,提高網(wǎng)絡(luò)的安全性。

        【點石成金】該句的主干為computer scientists worldwide have been trying to developadvanced intrusion detection systems (IDSs);that could help to identify...safety為that引導(dǎo)的定語從句,修飾先行詞intrusion detection systems,且關(guān)系代詞that在從句中作主語;To overcome...systems為不定式結(jié)構(gòu)作目的狀語。

        2. A key step in the development and training of MLbasedIDSs is the selection ofdata features that a model can rely on or focus on when making predictions. 基于機(jī)器學(xué)習(xí)的入侵檢測系統(tǒng)開發(fā)和訓(xùn)練的關(guān)鍵步驟是選擇模型在進(jìn)行預(yù)測時可以依賴或關(guān)注的數(shù)據(jù)特征。

        【點石成金】該句的主干為A key step is the selection of data features;in thedevelopment and training of MLbasedIDSs 為介詞結(jié)構(gòu)作后置定語,修飾A key step;that a model can rely...focus on為that引導(dǎo)的定語從句,修飾先行詞data features,且關(guān)系代詞that在從句中作賓語;when making predictions為when引導(dǎo)的時間狀語從句的省略形式,省略了主語a model和be動詞is。

        猜你喜歡
        中作點石成金代詞
        In a wheelchair to visit every continent坐著輪椅環(huán)游七大洲
        復(fù)合不定代詞點撥
        Of Human Bondage(Excerpt)
        代詞(一)
        代詞(二)
        鍥而不舍 點石成金
        這樣將代詞考分收入囊中
        點石成金
        寶藏(2018年1期)2018-01-31 02:05:09
        2017年,“點石成金”攻略
        寶藏(2017年2期)2017-03-20 13:17:00
        分析高考試題,辨別what與that
        国产男女猛烈无遮挡免费网站| 日本一区中文字幕在线播放 | 精品亚洲第一区二区三区| 欧美人妻aⅴ中文字幕| 久久av无码精品人妻出轨| 国产一精品一aⅴ一免费| 国产一区二区资源在线观看| 无码av中文一区二区三区| 日本乱人伦在线观看| 成人无码网www在线观看| 国产在线观看女主播户外| 偷看农村妇女牲交| 精品国产精品久久一区免费式| 大伊香蕉精品视频一区| 日本一区二区不卡在线| 久久精品国产精品亚洲| 亚洲综合无码一区二区三区| 成美女黄网站18禁免费| 涩涩鲁精品亚洲一区二区| 99久久久国产精品免费蜜臀| 中文字幕天堂在线| 一本久久综合亚洲鲁鲁五月夫| 婷婷色国产精品视频二区 | 白浆国产精品一区二区| 成人欧美一区二区三区1314| 中文字幕亚洲综合久久菠萝蜜| 国产自拍在线视频观看| 国产欧美日韩中文久久| 精品无码一区二区三区亚洲桃色 | 日本高清一区二区三区在线| 最新欧美精品一区二区三区| 制服丝袜人妻中文字幕在线| 亚洲色欲色欲www成人网| 国产精品亚洲一区二区麻豆| 亚洲欧美精品suv| 中文字幕AⅤ人妻一区二区| 亚洲中文字幕乱码免费看| 色综合天天综合欧美综合| 亚洲经典三级| 亚洲av网一区天堂福利| 职场出轨的人妻中文字幕|