• In this paper, attack detection technique, based on auditing information, of information resistance techniques is mainly presented.

    该文重点阐述了信息对抗技术基于审计信息攻击检测技术

    youdao

  • The influence of wormhole attack on the node's number of neighbors is analyzed, and a logic topology based method is proposed for attack detection.

    分析了攻击对于网络节点邻居数目影响提出了一种基于网络逻辑拓扑的攻击检测方法

    youdao

  • In view of the demand that distributed attack detection needs massive data, this paper puts forward a cooperative detection model based on component structure.

    本文针对检测分布式入侵时海量数据分析应用需求,提出一种基于组件结构的协同检测模型

    youdao

  • This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.

    该文安全路由协议基础针对流量模式攻击提出一种基于数据链路监视攻击检测机制

    youdao

  • Test results show that embedding around video quality has not changed significantly, in the absence of attack detection of the watermark and the original watermark than no obvious changes.

    试验结果表明水印嵌入前后,视频质量没有显明变化攻击时检测水印信息水印信息比拟也没有显明的变化。

    youdao

  • Utilizing features of grey theory that less data is needed in model construction, and method that each node undertakes detection tasks, this model will save energy consumed in attack detection.

    模型利用理论建模所需数据较少特点,结合节点分担检测任务方法节约检测攻击行为所需耗能

    youdao

  • Current attack detection methods for all-optical networks were analyzed, and applications of optical fiber sensing technique were discussed in attack detection methods for all-optical networks.

    本文介绍了全网络的组成结构,攻击光网络的几种手段,分析了现存的攻击测试方法讨论光纤传感技术全光网络攻击测试方法中的应用

    youdao

  • To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合的攻击检测模型(GADM)。

    youdao

  • This attack has reportedly prompted discussions about introducing an electronic detection system.

    报道,这次袭击引发关于增设电子检测系统的讨论

    youdao

  • Joint research should improve detection capabilities, and help track the source of any materials used in an attack.

    联合研究将会改善核查能力有助追踪某次袭击所用任何材料来源

    youdao

  • New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.

    僵尸网络检测阻止他人控制电脑存取私人信息使用举办一次攻击

    youdao

  • The way of attack signature detection has advantage of high accuracy.

    基于攻击特征检测具有准确性优点

    youdao

  • Detection of these types of attacks is facilitated by the fact that the perpetrators attack classes of files.

    基于入侵者攻击文件事实,检测此类攻击不难的。

    youdao

  • The frigate can attack surface warships and submarines alone or together with other forces of the PLA Navy. It also has strong capabilities of guard, detection and combat.

    滨州单独或者协同海军其他兵力攻击水面舰艇、潜艇具有较强警戒探测和综合作战能力

    youdao

  • In order to improve the level of detection technology and testing equipment, we must first have a deep understanding of the attack technology.

    为了提高检测技术检测设备水平首先攻击技术非常深入的了解

    youdao

  • Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.

    传统入侵检测方法面对多变网络结构缺乏扩展性,而且在未知攻击类型面前缺乏适应性

    youdao

  • Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.

    贝叶斯分类模型入侵检测用于攻击类型分类有力工具

    youdao

  • This system has three functions: misused detection, anomaly detection, and attack source traceback.

    系统实现了误用检测异常检测、攻击追踪三个方面的功能

    youdao

  • This kind of enticement detection broke through the bottom line of the attack crime agent, which violated citizen's basic rights seriously, we should remove it decidedly in the judicial practice.

    这种诱惑侦查突破打击犯罪底线严重侵害公民基本权利司法实践中应该断然排除

    youdao

  • Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.

    第三章介绍网络协议基础常见攻击方法原理入侵检测系统规范标准

    youdao

  • This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    本文分析ARP协议及其工作原理现有的ARP欺骗攻击防御方法以及防御检测特点。

    youdao

  • By analyzing the principles of Smurf attack, this paper proposes the detection method and defense technology of this attack.

    该文分析这种攻击实施原理的基础上,提出这种攻击的检测方法防范技术

    youdao

  • By analyzing the principles of Smurf attack, this paper proposes the detection method and defense technology of this attack.

    该文分析这种攻击实施原理的基础上,提出这种攻击的检测方法防范技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定