记作业>英语词典>intrusions翻译和用法

intrusions

英 [ɪnˈtruːʒənz]

美 [ɪnˈtruʒənz]

n.  侵扰性的事物; 扰乱; 侵犯; 闯入; 侵入
intrusion的复数

柯林斯词典

  • N-VAR 打扰;侵扰
    If someone disturbs you when you are in a private place or having a private conversation, you can call this event anintrusion.
    1. I hope you don't mind this intrusion, Jon.
      乔恩,希望你别介意这次打扰。
  • N-VAR 干扰;影响
    Anintrusionis something that disturbs your mood or your life in a way you do not like.
    1. ...intrusion into private grief...
      对个人不幸的搅扰
    2. I felt it was a grotesque intrusion into our lives.
      我感觉那是对我们生活的一种干扰,让人感到荒唐可气。

双语例句

  • Efficiency of any anti-virus solution depends on the extent of protection it can provide against intrusions and threats.
    任何防病毒解决方案的效率取决于程度的保护,它可以提供对入侵和威胁。
  • The Chief Constable deeply resented any intrusions into his manor
    警察局局长对侵入其辖区的行为深恶痛绝。
  • In this article, I'll go well beyond installation and configuration, and talk about how to set up Snort to detect Web-related intrusions.
    在本文中,我将越过基本的安装和配置知识,讨论如何设置Snort,以检测与Web相关的入侵。
  • The layered intrusions show chilled contacts against the diabases but are traversed by the dikes.
    层状侵入体与辉绿岩接触处有冷凝边,但都被岩脉所穿插。
  • They openly and wantonly carried out repeated armed intrusions into our country.
    他们明目张胆地对我国不断发动武装入侵。
  • When a crisis occurs or external forces make hostile intrusions, the public nationalism will be aroused.
    在危机发生时,或当有外部力量非友好入侵时,公众的民族主义情绪就会被唤醒。
  • They protect a network and attempt to prevent intrusions, while IDS tools detect whether or not the network is under attack or has, in fact, been breached.
    他们(防火墙)保护着网络的安全,试图阻止入侵,这个时候当IDS工具检测开始检测网络,无论是否处于攻击之中,事实上(这个时候)已经被入侵了。
  • But it said that the intrusions had only limited effect.
    但它说,这些入侵活动的影响有限。
  • The basic concept, the components and the way of detecting intrusions of the DIDS are introduced.
    介绍了分布式入侵检测系统的基本组成,各组成部分的功能和入侵检测的方法。
  • In the end, this approach leads to governance and compliance chaos, opening the door to potential data loss as well as malicious intrusions.
    最后,这种做法导致治理与合规性的混乱,向潜在的数据丢失以及恶意入侵敞开了大门。