• 第三部分重点网络攻击效果评估方法进行介绍。

    In the third part of this paper, the effect evaluation technology is presented in emphasis.

    youdao

  • 该文评估网络攻击效果角度研究网络安全问题

    This paper investigates network security problems from the point of view of the evaluation of network attack effect.

    youdao

  • 提出基于网络信息熵计算机网络攻击效果定量评估模型

    An attack effect evaluation model of computer network based on network entropy was proposed in this paper.

    youdao

  • 网络攻击效果评估指标之间权重分配进行评估一个关键问题

    The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.

    youdao

  • 网络攻击效果评估理论方法研究信息系统安全评估过程中具有深刻的理论指导意义重要的应用价值。

    The evaluation theory and method of the attack effect of networks are very important and significant in information systems.

    youdao

  • 特定的时候很难办到,”,“如果网络攻击作为军事武器使用,希望得到一个可预测的时间效果

    It’s hard to do it at a specific time, ” he says. “If a cyber-attack is used as a military weapon, you want a predictable time and effect.

    youdao

  • 很难某个特定的时间进行网络攻击,”,“如果网络攻击当作军事武器需要预先设定时间攻击效果。”

    "It's hard to do it at a specific time," he says. "if a cyber-attack is used as a military weapon, you want a predictable time and effect."

    youdao

  • 实验结果表明系统模型不仅可以保护网络主机不受已有攻击的威胁,还可以检测出未知攻击达到预期效果

    Expermental results show that the system model can not only protect the network and host from existing attacks, can detect unknown attacks, achieved the expected results.

    youdao

  • ARP欺骗ICM P重定向攻击以太网中常用攻击手段两者都达到监听网络对目标主机进行拒绝服务攻击效果

    ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

    youdao

  • ARP欺骗ICM P重定向攻击以太网中常用攻击手段两者都达到监听网络对目标主机进行拒绝服务攻击效果

    ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定