• 分析高级随机包标记算法(AMS)基础上提出种基于反向确认的攻击源追踪模型模型不再需要AMS假设前提

    On the basis of analysis about advanced marking scheme (AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS.

    youdao

  • 基于最小特权原理,从分析进程访问权限出发,提出一种防御恶意程序攻击的数据保护模型

    After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.

    youdao

  • 结果表明利用符号模型检测方法分析发现密码协议重放攻击的漏洞种行之有效的方法

    Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.

    youdao

  • 现实世界动物行为分析为依据,建立了合理的敌对群体行为的通用攻击模型

    Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.

    youdao

  • 扩展诚实理想分析模型不仅继承了理论有关性质而且适应猜测攻击分析

    The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.

    youdao

  • 通过实例分析证明了算法模型适合全面分析网络安全性攻击可能采取行为方式

    Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.

    youdao

  • 提出了匿名通信系统中的统计攻击模型,对两种攻击模型攻击能力定量分析

    Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    youdao

  • 深入系统分析攻击模型攻击测试应用

    Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.

    youdao

  • 通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型特点进行了讨论

    Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    youdao

  • 最后本文系统模型应用于网络拒绝服务攻击环境的实例进行分析提出了一种应用聚类分析对系统改进方法

    Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.

    youdao

  • 论述日志关联分析平台体系结构功能模块基础上,提出一种新的网络攻击追踪系统模型

    The article provides the system architecture and the principal functions of the log correlation system, then presents a framework of network attacker-tracing system.

    youdao

  • 采用解析建立攻击目标搜索模型分析对比度能见距离发现概率影响

    Analytic method was used to build up a target searching model for the attacker, and the effect of contrast and visible distance on detection probability was analyzed.

    youdao

  • 给出一个网络攻击模型模型攻击过程归纳若干阶段详细地分析黑客阶段采用技术方法。

    This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    youdao

  • 通过对超视距空中机动目标分析合理的假设之后,提出了空空导弹攻击视距空中目标的基本模型

    The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.

    youdao

  • 本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    youdao

  • 最后,对信任模型有效性攻击能力进行理论分析和实验验证。

    Finally, the effectiveness and resistibility of the proposed trust model are analyzed theoretically and evaluated experimentally.

    youdao

  • 分析结果表明模型可信节点剩余很少完成网络中节点的认证,亦可避免攻击获取足够分量进行非法认证

    The analysis shows that this model can avoid attackers getting enough weight for the private key for lawlessly validating and validate the network nodes when trust nodes remain small.

    youdao

  • 对策基础,构建空战机动攻击阶段的对策模型通过模糊决策分析找出优机动策略。

    Based on game theory, a model for air combat maneuvering decision-making was established. Then the optimal maneuvering strategy was obtained through fuzzy decision analysis.

    youdao

  • 其次我们分析网络环境下攻击模型考虑承诺方案应该具备的性质,并形式化定义公钥模型下承诺方案应该达到的安全属性。

    Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.

    youdao

  • 其次我们分析网络环境下攻击模型考虑承诺方案应该具备的性质,并形式化定义公钥模型下承诺方案应该达到的安全属性。

    Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定