同时还描述了一种利用此攻击模型进行攻击检测和预警的方法。
A method of detecting network attacks and early warning using the model was also described.
研究表明欺诈攻击的攻击模型、攻击成本对攻击性能有不同程度的影响。
Recent research shows that the model and the cost of shilling attacks have different impacts on attack performance.
以对现实世界中动物的行为分析为依据,建立了合理的敌对群体行为的通用攻击模型。
Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.
文章建立了基于DFA的攻击模型,并在此基础上利用Z语言对之进行了有效的形式化描述。
In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.
结果表明,在所用分组密码是伪随机置换的条件下,方案在分块适应性攻击模型下是可证明安全的。
Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
威胁模型用于确定服务器中的这些弱点并研究可能的攻击。
A threat model seeks to identify these points in the server and to develop possible attacks.
然而,最近这种有效市场理论遭到了行为模型学说攻击。该学说成功的用极具说服力的理由击中对方软肋。
Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.
这个模型显示,一旦T细胞释放入血,它们就可以强烈攻击HIV蛋白,即使它们已经变异了。
The model also showed that once those T cells are released into the bloodstream, they can effectively attack HIV proteins, even when the virus mutates.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
海曼对上瘾的大脑模型发起了毁灭性的攻击。
Heyman mounts a devastating assault on the brain-based model of addiction.
标记的可伸缩性优点的获得以避开同源策略安全性模型为代价,可能导致易于收到攻击。
The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.
如果模型错误,你会有多么易受攻击?
贝叶斯分类模型是入侵检测中用于攻击类型分类的有力工具。
Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.
利用该模型可以在两个对等实体之间建立高效、可靠的信任关系,有效防止恶意攻击,提高P 2 P网络的效率和安全。
The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.
2006年,他的同事马修·邦恩创建了一个数学模型,以此预测出未来10年核攻击概率为29%。
In 2006, his colleague Matthew Bunn created a mathematical model predicting a 29 percent probability of a nuclear attack in the next 10 years.
结果表明,这种数据收集模型为协同检测奠定了基础,提高了对分布式攻击的检测能力。
It is shown that this model of data collection establishes the basis of collaborative detection and greatly improves the capability of detecting distributed attacks.
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
根据电子攻击信号脉冲与被保护雷达信号脉冲在重叠时间大小以及先后到达顺序上的不断变化,对某一被保护雷达,给出了电子攻击信号源的布站模型。
Based on the changing of the overlap time and the arrival orders of the pulses of EA signal pulse and a certain radar signal pulse, the model of EA emitters is put forwarded.
在网络节点之间存在安全依赖关系的前提下,提出了一个基于贝叶斯方法的网络攻击定位和追踪模型。
Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
在研究模糊数学理论的基础上,设计了一个基于模糊数学的攻击危害度评判模型。
After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.
提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。
An attack effect evaluation model of computer network based on network entropy was proposed in this paper.
提出了一种分布式拒绝服务攻击的软防御系统模型。
A kind of soft defense system model to distribute denial service attack is proposed.
在MSR框架结构下定义了密码协议的秘密性和认证性。3改进了协议模型和攻击者模型,主要解决了攻击者模型中出现的无限循环状态。
Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.
在MSR框架结构下定义了密码协议的秘密性和认证性。3改进了协议模型和攻击者模型,主要解决了攻击者模型中出现的无限循环状态。
Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.
应用推荐