• The graph model of network attack.

    网络入侵模型

    youdao

  • Network covert channel has been widely used for network attack.

    网络隐蔽通道技术一种被广泛应用网络攻击技术。

    youdao

  • NVS is based on Trojan horse architecture and facing to network attack.

    基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    youdao

  • Aim Provide a literature basis for research strategy of the network attack technology.

    目的网络攻击技术研究策略提供文献依据。

    youdao

  • The key question of network attack research is how to understand and describe the attack.

    网络攻击研究一个关键问题对攻击的认识描述

    youdao

  • As a means of network attack, IP cheating has been put more and more attention in recent years.

    IP欺骗作为网络攻击一种手段近年被人们越来越重视

    youdao

  • This paper expounds the characteristics of network attack, and puts forward corresponding measures.

    本文阐述网络攻击特点提出网络安全的防范措施。

    youdao

  • Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.

    脆弱性复杂网络系统固有本性,是网络攻防焦点

    youdao

  • The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.

    网络攻击效果评估指标之间权重分配进行评估一个关键问题

    youdao

  • The severity of the network attack mean the degree of danger suffered by whole system from network attack.

    网络攻击危害是指网络攻击整个应用系统造成危害的程度

    youdao

  • Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.

    缓冲区溢出攻击互联网普通也是危害最大的一网络攻击手段

    youdao

  • This paper introduces the status quo of network attack classification summarily, and the trend is analysed.

    概要介绍了国内外关于网络攻击分类技术的研究现状对其发展趋势进行了分析。

    youdao

  • Based on abduction inference, a method of network attack process analysis for incident response was designed.

    针对事后入侵响应,提出了一种基于引理推理攻击过程分析方法

    youdao

  • In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.

    文章建立了基于DFA攻击模型此基础上利用Z语言之进行了有效的形式化描述

    youdao

  • According to the characteristics of network counterwork, discussed methods of network attack and network defense.

    针对网络对抗特点探讨了网络攻击手段以及网络防御手段。

    youdao

  • Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    youdao

  • This paper investigates network security problems from the point of view of the evaluation of network attack effect.

    该文评估网络攻击效果角度研究网络安全问题

    youdao

  • What's more, the research of backbone topology is strategetic and of great importance in network attack and defense.

    更重要的是骨干网拓扑结构研究具有战略性,网络攻防中的作用举足轻重。

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

  • Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.

    目前传统被动防御技术无法应对不断增加大规模网络攻击行为

    youdao

  • Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    主要方式网上教授病毒木马制作技术各种网络攻击技术;

    youdao

  • The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.

    网络攻击防护一对矛盾严格地没有绝对的网络安全

    youdao

  • A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.

    文中设计出了一个分布式网络攻击测试系统模块化的体系结构使系统具有良好可扩展性

    youdao

  • With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.

    随着互联网飞速发展网络攻击安全防护技术日益受到关注。

    youdao

  • As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.

    前面所启用WebSphereApplicationServer安全性使得大多数内部传输使用ssl保护不受各种形式网络攻击

    youdao

  • As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.

    作为信息安全防御技术对立面网络渗透技术信息安全领域里扮演重要角色

    youdao

  • This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.

    该文计算机网络安全防御措施展开指出常见网络攻击及其防御措施。

    youdao

  • To solve the security problem in network, based on the ideas and the methods of network cybernetics, the model of network attack and defense was proposed.

    基于网络控制论基本概念原理,解决网络安全问题提出了一种网络攻防控制模型

    youdao

  • With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.

    随着网络安全领域研究深入网络服务广泛应用人们网络攻击数据集需求量逐渐增大。

    youdao

  • With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.

    随着网络安全领域研究深入网络服务广泛应用人们网络攻击数据集需求量逐渐增大。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定