• Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.

    针对网络安全分析研究要求,在已有研究的基础上,提出了一种灵活的网络攻击生成方法

    youdao

  • The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.

    论文漏洞评估原理攻击路径漏洞本身,提出种基于攻击路径的漏洞风险评估模型。

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.

    同时,借鉴国内外研究成果基础上,探讨攻击路径自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。

    youdao

  • The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.

    发明有效地降低攻击算法开销,在提高发现网络攻击准确度的同时,不会降低发现过程时效性

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • In this algorithm, an extended directed graph is used to show attack types and their relations, while the correlation is performed according to the method of forwards matching and absent matching.

    算法采用表示攻击类别及其逻辑关系按照前向匹配缺项匹配方式对报警进行关联

    youdao

  • The graph model of network attack.

    网络入侵模型

    youdao

  • By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.

    提取目标系统及其弱点信息攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态给出生成算法。

    youdao

  • Large networks attack can be researched base on the graph theory, because the character of its network connect and route of spread is related closely to weighted and oriented graph.

    由于大规模网络入侵网络连接上、传播路径上所体现出来特性中的赋权有图有着共同的特性,这使得在图论的基础进行大规模网络入侵检测的研究成为可能

    youdao

  • Dynamic graph watermark (DGW) is one of the best dynamic software watermarks. The idea of DGW is encoding the watermark into topology graph in order to be immune to semantics preserving attack.

    动态软件水印技术目前最好动态软件水印技术之一,核心思想水印信息编码拓扑图结构从而使拓扑图进行变换的保持语义攻击难以实现。

    youdao

  • Dynamic graph watermark (DGW) is one of the best dynamic software watermarks. The idea of DGW is encoding the watermark into topology graph in order to be immune to semantics preserving attack.

    动态软件水印技术目前最好动态软件水印技术之一,核心思想水印信息编码拓扑图结构从而使拓扑图进行变换的保持语义攻击难以实现。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定