• 利用攻击模型蠕虫攻击进行检测

    Carrying the detection on worm attack out by the attack-tree model.

    youdao

  • 深入系统分析攻击模型攻击测试应用

    Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.

    youdao

  • 网络通信模型基础上,进一步结合蠕虫传播特征本文提出蠕虫攻击树模型

    Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.

    youdao

  • 该文采用攻击模型模拟攻击行为,并提出了一个基于攻击树模型原理攻击规范语言

    This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.

    youdao

  • 通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型特点进行了讨论

    Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    youdao

  • 文章介绍攻击模型提出了一种基于攻击树网络攻击系统,它可以根据目标实际情况制定出攻击策略,实施攻击

    This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.

    youdao

  • 文章介绍攻击模型提出了一种基于攻击树网络攻击系统,它可以根据目标实际情况制定出攻击策略,实施攻击

    This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定