Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.
深入系统地分析了攻击树模型在抗攻击测试中应用。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.
该文采用攻击树模型来模拟攻击行为,并提出了一个基于攻击树模型原理的攻击规范语言。
This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.
文章介绍了攻击树模型,提出了一种基于攻击树的网络攻击系统,它可以根据目标的实际情况制定出攻击策略,实施攻击。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
Carrying the detection on worm attack out by the attack-tree model.
利用攻击树模型对蠕虫攻击进行检测。
Carrying the detection on worm attack out by the attack-tree model.
利用攻击树模型对蠕虫攻击进行检测。
应用推荐