• This paper focuses on discovering the potential attack behaviors by analyzing association rules in audit data.

    本文通过审计数据进行关联规则分析,发现潜在攻击系统行为

    youdao

  • This model makes it hard to predict and prevent attack behaviors, and enhances the possibility of success attack.

    这种模型使得攻击非常难以预测防范大大提高了攻击成功可能性

    youdao

  • The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.

    网络攻击行为频度复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们关注

    youdao

  • By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.

    提取目标系统及其弱点信息攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态给出生成算法。

    youdao

  • Results Compared with controls, attack and explore behaviors of anxiety rats manifolded, and embellishment decreased(P<0.01).

    结果空瓶刺激期间,对照组相比焦虑探究攻击行为明显增多修饰行为减少P< 0 0 1)。

    youdao

  • Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.

    网络流量异常网络流量行为偏离正常行为情形具有发作突然先兆特征未知特点,有可能在短时间内给网络及其设备带来极大的伤害。

    youdao

  • Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.

    网络流量异常网络流量行为偏离正常行为情形具有发作突然先兆特征未知特点,有可能在短时间内给网络及其设备带来极大的伤害。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定