国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

提高網絡安全,科學家在努力

2023-03-20 02:16:46重慶
瘋狂英語·新悅讀 2023年2期
關鍵詞:中作點石成金省略

重慶 龔 勇

主題語境:科技與信息 篇幅:314詞 建議用時:7分鐘

1Network-based technologyhasbecome increasingly widespread,and it is now being used by countless individuals,professionals,and businesses worldwide.Despite the technology's advantages,most network-based systems are highly weak to malicious attacks.The consequences of a malicious attack on network-based systems can be extremely severe and devastating.For instance,an attack on a power utility network could leave millions of individuals and offices without electricity,while attacks on social media networks can lead to the disclosure of user information.

2To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion(入侵)detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.In recent years,machine learning(ML)algorithms(算法)have been found to be particularly promising for automatically detecting attacks and intrusions on a network's functioning.

3A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.Ideally,by analyzing large datasets,researchers should be able to identify the most suitable features for solving a given task using ML tools,and this is also applicable to intrusion detection.

4Researchers at Canadian University Dubai in the UAE have recently developed a new feature selection method that could enable the development of more effective ML-based IDSs.This method,presented in a paper pre-published on arXiv,was found to perform remarkably well when compared with other commonly employed feature selection techniques.“Our goal is to study feature selection in network traffic data with the aim of detecting potential attacks,”Firuz Kamalov,Sherif Moussa,Rita Zgheib and Omar Mashaal,the researchers who carried out the study,wrote in their paper.“We consider various existing feature selection methods and propose a new feature selection algorithm to identify the most effective features in network traffic data.”

Reading

Check

1.What's the function of the two examples mentioned in paragraph 1?

A.To present the power of network-based systems.

B.To show the weaknesses of network-based systems.

C.To explain the variety of malicious attacks.

D.To illustrate the serious results of malicious attacks.

2.How do IDSs improve a network's safety?

A.By preventing malicious attacks.

B.By recognizing malicious attacks.

C.By imitating malicious attacks.

D.By devastating malicious attacks.

3.What's the key to the development of ML-based IDSs?

A.The settlement of tasks.

B.The analysis of datasets.

C.The prediction of the model.

D.The choosing of data features.

Language

Study

Ⅰ.Useful expressions

for instance例如;比如

rely on依靠;依賴

be able to do能夠做……

compare with與……相比較

Ⅱ.Difficult sentences

1.To overcome the weaknesses of network-based systems,computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs)that could help to identify malicious attacks,increasing a network's safety.為了克服基于網絡的系統(tǒng)的弱點,世界各地的計算機科學家一直在嘗試開發(fā)先進的入侵檢測系統(tǒng),這類系統(tǒng)可以幫助識別惡意攻擊,提高網絡的安全性。

【點石成金】該句的主干為computer scientists worldwide have been trying to develop advanced intrusion detection systems(IDSs);that could help to identify...safety為that引導的定語從句,修飾先行詞intrusion detection systems,且關系代詞that在從句中作主語;To overcome...systems為不定式結構作目的狀語。

2.A key step in the development and training of ML-based IDSs is the selection of data features that a model can rely on or focus on when making predictions.基于機器學習的入侵檢測系統(tǒng)開發(fā)和訓練的關鍵步驟是選擇模型在進行預測時可以依賴或關注的數據特征。

【點石成金】該句的主干為A key step is the selection of data features;in the development and training of ML-based IDSs為介詞結構作后置定語,修飾A key step;that a model can rely...focus on為that引導的定語從句,修飾先行詞data features,且關系代詞that在從句中作賓語;when making predictions為when引導的時間狀語從句的省略形式,省略了主語a model和be動詞is。

猜你喜歡
中作點石成金省略
Of Human Bondage(Excerpt)
鍥而不舍 點石成金
偏旁省略異體字研究
點石成金
寶藏(2018年1期)2018-01-31 02:05:09
2017年,“點石成金”攻略
寶藏(2017年2期)2017-03-20 13:17:00
分析高考試題,辨別what與that
分析高考試題,辨別what與 that
中間的省略
詩選刊(2015年6期)2015-10-26 09:47:13
點石成金
省略
詩歌月刊(2009年4期)2009-05-22 03:38:04
白城市| 安仁县| 凌云县| 蓬安县| 安福县| 调兵山市| 桂林市| 普陀区| 陇南市| 松阳县| 陆川县| 双江| 阿鲁科尔沁旗| 特克斯县| 乌拉特后旗| 咸丰县| 德江县| 安顺市| 商洛市| 河津市| 滦平县| 合作市| 赤水市| 巨野县| 漳浦县| 收藏| 宣汉县| 徐州市| 长子县| 刚察县| 漳浦县| 台中市| 江陵县| 平泉县| 宝兴县| 中超| 桐庐县| 晋江市| 义马市| 邳州市| 武平县|