• 利用实验室环境原型系统进行性能攻击测试

    In lab environment, we test the performance and the ability to keep up attack for prototype system.

    youdao

  • 深入系统分析攻击模型攻击测试应用

    Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.

    youdao

  • 虽然攻击测试处理后相关系数值有所下降,但是检测出水印

    The corresponding modulus has fallen down , but the watermark still can be detected.

    youdao

  • 本文提出了一个面向测试协议攻击描述模型以及相应的协议攻击测试算法。

    A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.

    youdao

  • 因此模型中的信息收集以后可以用来进行攻击测试评估网络安全水平

    Thus, information gathered in the model can later be used to conduct testing attacks in order to evaluate the network security level.

    youdao

  • 文中设计出了一个分布式网络攻击测试系统模块化的体系结构使系统具有良好可扩展性

    A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.

    youdao

  • 模型算法进行多种典型攻击测试实验结果表明模型具有较高检测,并有效降低率。

    The experimental results show that the model has high detection rate, and which can deduce the false alarm rate effectively.

    youdao

  • 实验结论攻击测试表明算法对JPEG有损压缩滤波附加噪声剪切各种图像处理攻击有较强的棒性。

    Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.

    youdao

  • BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • 本文介绍了全网络的组成结构,攻击光网络的几种手段,分析了现存的攻击测试方法讨论光纤传感技术全光网络攻击测试方法中的应用

    Current attack detection methods for all-optical networks were analyzed, and applications of optical fiber sensing technique were discussed in attack detection methods for all-optical networks.

    youdao

  • 我们采取了适当措施拦截发射测试实验室无线电干扰信号以后我们自己测试这次攻击证实了使用正确设备有可能阻断信号的。

    After taking appropriate measures to contain the RF interference to our test lab, we tested the attack out for ourselves, and were able to verify that it's possible with the right equipment.

    youdao

  • 除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    youdao

  • 这项研究测试了两种疫苗的组合注射,采用“启动—提高”的办法其中第一种疫苗启动免疫系统攻击艾滋病毒第二种疫苗则强化反应

    The study tested a two-vaccine combination in a "prime-boost" approach, where the first one primes the immune system to attack the HIV virus, and the second one strengthens the response.

    youdao

  • 如果测试计算机上其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重问题例如拒绝服务攻击

    If there are other users of your test machine, they must be aware of your test plansotherwise they may think they are experiencing some severe problem such as a denial-of-service attack.

    youdao

  • 如果24小时程序进行模糊测试依然无事,那么随后同种类型攻击不大可能危及到

    If you've fuzzed your program for 24 hours and it's still standing, then it's unlikely that further attacks of the same sort will compromise it.

    youdao

  • 然而一些观察家认为,BX - 1实际上为了测试共轨型反卫星(ASAT)攻击需要某些能力

    However, some observers have concluded that the BX-1 was actually a test of some of the capabilities required for a co-orbital anti-satellite (ASAT) attack.

    youdao

  • 攻击可以自动多个站点上进行测试

    The attacker can automate to go against multiple sites at one time.

    youdao

  • 作为测试攻击宏达公司的Android-basedLegendandDesire手机实施的,但是相信在其他的Android手机上一样可以

    The test attacks were conducted on HTC Corp's Android-based Legend and Desire phones, but he believed it could be conducted on other Android phones.

    youdao

  • 模糊测试中,随机数据(也称做fuzz)攻击一个程序然后等着观察哪里遭到了破坏

    In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.

    youdao

  • 吞吐量测试过程中,8500e解释了发自Ixia,到6个端口的,作为DoS攻击的海量数据立即阻塞了所有流量

    During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.

    youdao

  • 如果使用的是XMLThreatprotection确保不会妨碍测试(出现可疑的XML - DOS攻击)。

    If you are using XML Threat protection, make sure it does not block your test (because of suspecting XML-DOS Attack).

    youdao

  • 白帽黑客专家,指公司雇佣专家测试他们官网网站email系统是否易受攻击

    White-hat hacking Experts hired by companies to test their websites or email systems for vulnerabilities.

    youdao

  • 如果开发者使用Spring框架设计测试应用时候头脑中能安全问题有个清楚且正确的认识的话,企业应用在部署之后也就不会那么容易遭到攻击了。

    The right security awareness in the design and testing phase of applications using the Framework can protect enterprises from exploitation after deployment.

    youdao

  • 大多数紧急问题发现由于动态分析是作为一个黑客测试这个应用程序的,因此它会找出攻击者所发现十分相似问题。

    Discovery of the most critical issues: Since dynamic analysis tests the application as a hacker would, it finds the issues most likely to be discovered by attackers.

    youdao

  • 这种方法根本不会产生安全代码因为无法创建足够多测试涵盖攻击做到所有稀奇古怪事情

    That approach simply won't produce secure code, because you can't create enough tests to represent all the odd things an attacker can do.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

  • 测试一个抵御模糊攻击应用程序时,可能黑盒测试通过一些明显修改基本想法还是可以应用的。

    When you're testing a fuzz-resistant application, you can't do pure blackbox testing, but with some obvious modifications, the basic ideas still apply.

    youdao

  • 这样测试期间,CEH尝试攻击系统之前,应该为其提供有关基础设施最少信息

    During such a test, the CEH is given minimal information about the infrastructure before he or she attempts to hack the system.

    youdao

  • 该机的首次飞行测试2011年进行,攻击能力测试采用模拟的方式进行。

    The first flight test will take place in 2011 and weapons capabilities will be simulated.

    youdao

  • 程序员阅读文件测试一个字节一个不变量似乎是无望的——这样会使程序模糊攻击

    Asking programmers to test each byte and every invariant when reading a file seems hopelessbut failing to do so leaves your programs vulnerable to fuzz.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定