• Aim Provide a literature basis for research strategy of the network attack technology.

    目的网络攻击技术研究策略提供文献依据。

    youdao

  • Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    主要方式网上教授病毒木马制作技术各种网络攻击技术;

    youdao

  • As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.

    作为信息安全防御技术对立面网络渗透技术信息安全领域里扮演重要角色

    youdao

  • To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    youdao

  • Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.

    目前传统被动防御技术无法应对不断增加大规模网络攻击行为

    youdao

  • The economic losses brought with network attack is also serious, this makes people have to aggravate the more regard the research for network safe defence system and corresponding technology.

    网络攻击带来经济损失越来越严重促使人们不得不越加重视网络安全防御体系相应技术研究

    youdao

  • Buffer overflow attack technology is a very efficient attack technology based on network.

    缓冲区溢出攻击技术一项十分有效的网络攻击技术。

    youdao

  • With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.

    随着互联网飞速发展网络攻击安全防护技术日益受到关注。

    youdao

  • This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    给出一个网络攻击模型模型将攻击过程归纳若干阶段详细地分析了黑客阶段采用技术方法。

    youdao

  • Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.

    入侵检测技术就是这样一动态策略通过网络系统实时监控,来达到动态保护目的。

    youdao

  • Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.

    当前网络入侵事件不断发生使得网络安全管理技术成为当今人们关注热点

    youdao

  • Network alarm causal correlation technology can help network administrators construct attack scenarios and take timely responses by unveiling the causal relationship of intrusion alarms.

    网络告警因果关联技术有助于管理员根据告警之间因果关系构建攻击场景及时调整防范措施。

    youdao

  • Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.

    不同网络环境条件下综合使用三种防范ARP攻击方法南京工业大学有效防御ARP攻击。

    youdao

  • This article uses the Honeynet technology together with the organization architecture for network and Detection Web Attack to achieve the target of avoiding the network attack.

    通过使用技术结合网络组织架构检测网站攻击达到防御网站攻击目的

    youdao

  • Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.

    移动代理在入侵检测中的应用”国家基础研究项目网络攻防技术子课题内容之一

    youdao

  • Program design, network technology, hacker attack and defense, and other e-books.

    程序设计网络技术黑客攻防各种电子书。

    youdao

  • Discovering software vulnerability is an important part of network attack and defense technology.

    软件漏洞挖掘网络攻防技术重要组成部分

    youdao

  • Discovering software vulnerability is an important part of network attack and defense technology.

    软件漏洞挖掘网络攻防技术重要组成部分

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定