The graph model of network attack.
网络入侵的图模型。
Network covert channel has been widely used for network attack.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
NVS is based on Trojan horse architecture and facing to network attack.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
The key question of network attack research is how to understand and describe the attack.
网络攻击研究的一个关键问题是对攻击的认识和描述。
As a means of network attack, IP cheating has been put more and more attention in recent years.
IP欺骗作为网络攻击的一种手段,近年来被人们越来越重视。
This paper expounds the characteristics of network attack, and puts forward corresponding measures.
本文阐述了网络攻击的特点,并提出网络安全的防范措施。
Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.
脆弱性是复杂网络系统的固有本性,是网络攻防的焦点。
The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.
网络攻击效果评估中指标之间权重分配是进行评估的一个关键问题。
The severity of the network attack mean the degree of danger suffered by whole system from network attack.
网络攻击的危害度是指网络攻击对整个应用系统造成危害的程度。
Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.
缓冲区溢出攻击是互联网上最普通,也是危害最大的一种网络攻击手段。
This paper introduces the status quo of network attack classification summarily, and the trend is analysed.
概要介绍了国内外关于网络攻击分类技术的研究现状,并对其发展趋势进行了分析。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.
文章建立了基于DFA的攻击模型,并在此基础上利用Z语言对之进行了有效的形式化描述。
According to the characteristics of network counterwork, discussed methods of network attack and network defense.
针对网络对抗的特点,探讨了网络攻击手段以及网络防御手段。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
This paper investigates network security problems from the point of view of the evaluation of network attack effect.
该文从评估网络攻击效果的角度研究网络安全问题。
What's more, the research of backbone topology is strategetic and of great importance in network attack and defense.
更重要的是,对骨干网拓扑结构的研究具有战略性,在网络攻防中的作用举足轻重。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.
目前,传统的被动防御技术将无法应对不断增加的大规模网络攻击行为。
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.
网络的攻击与防护是一对矛盾,严格地说,没有绝对的网络安全。
A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.
文中设计出了一个分布式网络攻击测试系统,模块化的体系结构使该系统具有良好的可扩展性。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.
作为信息安全防御技术的对立面,网络渗透技术在信息安全领域里扮演着重要的角色。
This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.
该文从计算机的网络安全及防御措施来展开,指出了常见的四种网络攻击及其防御措施。
To solve the security problem in network, based on the ideas and the methods of network cybernetics, the model of network attack and defense was proposed.
基于网络控制论的基本概念和原理,为解决网络安全问题,提出了一种网络攻防控制模型。
With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.
随着网络安全领域研究的深入和网络服务的广泛应用,人们对网络攻击数据集需求量逐渐增大。
With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.
随着网络安全领域研究的深入和网络服务的广泛应用,人们对网络攻击数据集需求量逐渐增大。
应用推荐