• 针对网络安全分析研究要求,在已有研究的基础上,提出了一种灵活网络攻击生成方法

    Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.

    youdao

  • 本文通过大量网络弱点分析,结合网络特性建立安全性分析模型生成网络攻击

    Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    youdao

  • 针对计算机系统安全故障方法网络信息系统的攻击方法应用了这一安全分析建模工作。

    The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    youdao

  • 攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    youdao

  • 发明有效地降低攻击算法开销,在提高发现网络攻击准确度的同时,不会降低发现过程时效性。

    The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.

    youdao

  • 发明有效地降低攻击算法开销,在提高发现网络攻击准确度的同时,不会降低发现过程时效性。

    The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定