The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
通过对超视距空中机动目标的分析和合理的假设之后,提出了用空空导弹攻击超视距空中目标的基本模型。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
The hierarchy of an aerial attack target menace evaluation model in air defense system is established using the hierachy analysis method, and the cost weighting coefficient is obtained.
首先运用层次分析法建立了防空系统对空袭目标价值评估模型的层次结构,并获得空袭目标的价值权重系数。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
介绍了空战中超视距多目标攻击过程,分析了多目标攻击过程的工作时序,及火控雷达对空空导弹截获概率的影响。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
介绍了空战中超视距多目标攻击过程,分析了多目标攻击过程的工作时序,及火控雷达对空空导弹截获概率的影响。
应用推荐