• Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.

    深入系统分析攻击模型攻击测试应用

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.

    该文采用攻击模型模拟攻击行为,并提出了基于攻击树模型原理攻击规范语言。

    youdao

  • This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.

    文章介绍攻击模型提出了一种基于攻击树的网络攻击系统可以根据目标实际情况制定出攻击策略,实施攻击。

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.

    网络通信模型基础上,进一步结合蠕虫传播特征本文提出蠕虫的攻击树模型。

    youdao

  • Carrying the detection on worm attack out by the attack-tree model.

    利用攻击模型蠕虫攻击进行检测

    youdao

  • Carrying the detection on worm attack out by the attack-tree model.

    利用攻击模型蠕虫攻击进行检测

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定