• 同时还描述了一种利用攻击模型进行攻击检测预警方法

    A method of detecting network attacks and early warning using the model was also described.

    youdao

  • 研究表明欺诈攻击攻击模型攻击成本攻击性能不同程度的影响

    Recent research shows that the model and the cost of shilling attacks have different impacts on attack performance.

    youdao

  • 现实世界动物行为分析为依据,建立了合理的敌对群体行为的通用攻击模型

    Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.

    youdao

  • 提出了匿名通信系统中的统计攻击模型,对两种攻击模型攻击能力定量分析

    Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    youdao

  • 建立卫星网络加密算法差分故障攻击模型模型合理性攻击实现过程进行了阐述。

    Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.

    youdao

  • 文章建立了基于DFA攻击模型此基础上利用Z语言之进行了有效的形式化描述

    In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.

    youdao

  • 结果表明,在所用分组密码随机置换的条件方案分块适应性攻击模型下是可证明安全的。

    Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation.

    youdao

  • 给出一个网络攻击模型模型攻击过程归纳若干阶段详细地分析了黑客阶段采用技术方法。

    This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    youdao

  • 威胁模型用于确定服务器中的这些弱点研究可能的攻击

    A threat model seeks to identify these points in the server and to develop possible attacks.

    youdao

  • 然而最近这种有效市场理论遭到行为模型学说攻击学说成功极具说服力的理由击中对方软

    Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.

    youdao

  • 这个模型显示一旦T细胞释放血,它们就可以强烈攻击HIV蛋白即使它们已经变异了。

    The model also showed that once those T cells are released into the bloodstream, they can effectively attack HIV proteins, even when the virus mutates.

    youdao

  • 公司用于检测漏洞保护s OA基础结构业务策略中包含用于目标攻击之间多个SOA深度防御模型

    A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.

    youdao

  • 海曼上瘾大脑模型发起了毁灭性攻击

    Heyman mounts a devastating assault on the brain-based model of addiction.

    youdao

  • 标记可伸缩性优点获得以避开同源策略安全性模型代价可能导致易于收到攻击

    The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.

    youdao

  • 如果模型错误会有多么易受攻击

    How vulnerable are you to model error?

    youdao

  • 贝叶斯分类模型入侵检测用于攻击类型分类有力工具

    Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.

    youdao

  • 利用模型可以在两对等实体之间建立高效可靠信任关系有效防止恶意攻击提高P 2 P网络效率安全

    The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.

    youdao

  • 2006年,同事马修·创建了一个数学模型,以此预测未来10攻击概率为29%。

    In 2006, his colleague Matthew Bunn created a mathematical model predicting a 29 percent probability of a nuclear attack in the next 10 years.

    youdao

  • 结果表明这种数据收集模型协同检测奠定基础提高了对分布式攻击检测能力

    It is shown that this model of data collection establishes the basis of collaborative detection and greatly improves the capability of detecting distributed attacks.

    youdao

  • 针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合攻击检测模型(GADM)。

    To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    youdao

  • 根据电子攻击信号脉冲被保护雷达信号脉冲重叠时间大小以及先后到达顺序不断变化一被保护雷达,给出了电子攻击信号源布站模型

    Based on the changing of the overlap time and the arrival orders of the pulses of EA signal pulse and a certain radar signal pulse, the model of EA emitters is put forwarded.

    youdao

  • 网络节点之间存在安全依赖关系前提下,提出一个基于贝叶斯方法的网络攻击定位追踪模型

    Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.

    youdao

  • 文章介绍现有信息隐藏系统模型攻击形式指出加入认证理论必要性

    This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.

    youdao

  • 研究模糊数学理论基础上,设计了一个基于模糊数学的攻击危害度评判模型

    After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.

    youdao

  • 提出基于网络信息熵计算机网络攻击效果定量评估模型

    An attack effect evaluation model of computer network based on network entropy was proposed in this paper.

    youdao

  • 提出了分布式拒绝服务攻击防御系统模型

    A kind of soft defense system model to distribute denial service attack is proposed.

    youdao

  • MSR框架结构下定义了密码协议秘密认证性。3改进了协议模型攻击模型,主要解决攻击模型中出现无限循环状态

    Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.

    youdao

  • MSR框架结构下定义了密码协议秘密认证性。3改进了协议模型攻击模型,主要解决攻击模型中出现无限循环状态

    Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定