在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
本文提出了一个面向测试的协议攻击描述模型,以及相应的协议攻击测试算法。
A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.
提出了一个安全的数字水印方案,该方案能够比较有效的抵抗现有已知的几种协议攻击。
A new secure watermarking scheme is proposed, which resists efficiently the current known watermarking protocol attacks.
通过对这些概念从理论角度的研究和分析,可以给协议攻击与对策的研究作一些新的指导。
The research and analysis of these concepts in theoretic angle may give rise to some new instructions for the research of attacks and countermeasures.
通过网络截获器和系统调用截获器,对各种各样的协议攻击、操作系统攻击和应用程序攻击进行防范。
By using network interceptor and system call interceptor, it resists all kinds of protocol attacks, operation system attacks and application attacks.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
他因在协议上签了字而受到攻击。
临时停火协议不能防止以后发生报复性攻击的可能性。
The temporary cease-fire agreement does not preclude possible retaliatory attacks later.
在以下几节中,您将找到关于ICMP和TCP的更详细的信息以及一些使用这些协议的有趣的攻击。
In the following sections you will find more detailed information about ICMP and TCP as well as some interesting attacks using these protocols.
还需要使用前面介绍的针对不同攻击类型的其他监视类型以及配置来确保与服务级协议的兼容性。
Other types of monitoring for the types of attacks mentioned above are also needed, as well as configurations to ensure compliance with service-level agreements.
该协议用于提供安全信息(比如用户凭证和交易信息)的机密性,还提供了防止中间人攻击的保护。
This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.
尽管我将不在本文中介绍任何IP级别的攻击,但我确实需要稍微详细地讨论IP,因为它是ICMP和TCP的底层协议。
While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.
随着建国方案的实现的可能性减少,阿巴斯先生承受了越来越尖刻的口头攻击,自1993年他与以色列领导共同签订《奥斯陆协议》后,就把自己的诚信赌在了两国方案身上。
As the prospect of statehood has receded, there have been harsher verbal attacks on Mr Abbas, who has staked his credibility on a two-state deal ever since he co-drafted the Oslo accords in 1993.
这意味着任何使用这些浏览器的用户容易遭到针对TLS 1.0协议的网络攻击。
This means that anyone using them might be vulnerable to a TLS 1.0 attack.
关键的问题是入侵者是使用定义良好的API和协议来进行攻击的。
The key is that the attack is executed using well-defined APIs and protocols.
短时间以后,两个被隔离的路由器会重新连接并发去其自己的边界网关协议更新信息,一旦攻击再开始,其会使它们再次断开。
A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more.
根据协议,俄罗斯将在2017年放弃其在乌克兰克里米亚的一处海军基地,在该地区一旦有事,西北风级两栖攻击舰就可以投入使用。
The Mistrals could matter in any conflict over Crimea in Ukraine, where Russia is due to give up a naval base in 2017.
IP协议簇本身的缺陷是导致别有用心者构造现今互联网上众多攻击的原因。
It is TCP/IP protocol family defects that cause some ulterior persons to make up numerous attacks on Internet.
一个IPS系统可以监控异常的行为,发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet和地址解析协议欺骗的攻击。
An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.
这个改变引入一些索引,允许对大的重传队列中的元素进行随机访问,这个改变对于解决TCP协议栈的find - first攻击问题很重要。
A change that introduces some sort of index that allows access to random elements of the large retransmission queue is critical to address the find-first attacks against the TCP stack.
而大部分真的是指大部分,据报道攻击大量的聚集目标需要CIA预先通知巴基斯坦当局,根据双方协议,若一次攻击超过20个人的目标则需要提前通知巴基斯坦的盟友。
And bulk really means bulk. The Journal reports that the growth in clusters of people targeted by the CIA has required the agency to tell its Pakistani counterparts about mass attacks.
它的功能,以监测网络和协议的攻击。
It has the function to monitor a network and to protocol attacks.
在参加了2009年的哥本哈根气候变化峰会之后,我在国内受到了攻击,因为人们觉得我在努力促成一份有约束力的全球协议时,做得太多或太少。
After attending the 2009 Copenhagen summit on climate change, I was attacked back home for either doing too much or too little in trying to bring about a binding global agreement.
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
对安全协议进行猜测攻击,如果攻击者不能正确猜测用户秘密,那么他就会设法使用其他的信息来验证这种猜测。
A guessing attack on a security protocol is an attack where an attacker guesses a chosen user's secret and if failed then seeks to verify that guess by using other information.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
现引入一种新类型攻击称为多协议猜测攻击,它可以存在于混合协议中。
In this paper it introduced new types of attacks called multi-protocol guessing attacks, which can exist when protocols are mixed.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
应用推荐