Discovering software vulnerability is an important part of network attack and defense technology.
软件漏洞挖掘是网络攻防技术的重要组成部分。
Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.
脆弱性是复杂网络系统的固有本性,是网络攻防的焦点。
What's more, the research of backbone topology is strategetic and of great importance in network attack and defense.
更重要的是,对骨干网拓扑结构的研究具有战略性,在网络攻防中的作用举足轻重。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
To solve the security problem in network, based on the ideas and the methods of network cybernetics, the model of network attack and defense was proposed.
基于网络控制论的基本概念和原理,为解决网络安全问题,提出了一种网络攻防控制模型。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
By applying Multisensor Data Fusion and Data Mining to intrusion detection, DIDM provides the comprehensive assessment of network attack and defense situations continuously and globally.
将多传感器数据融合与数据挖掘技术应用到分布式入侵检测中,可连续和全面地提供网络攻防战场环境态势的综合评估。
Network attack and defense are two inseparable components of network war. If we want to achieve the succession of attack and defense, we must know the protocol that support the network's run.
网络攻击和网络防御是网络战中不可分割的两个部分,要实现防御和攻击,必须首先了解支撑网络运行的协议。
CCS will monitor network activity and support defense operations in the event of an attack on Air Force networks.
CCS将监测网络活动和支持针对网络攻击事件的防卫行动。
Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.
如何辨别防御与攻击和增强网络安全已成为网络运营商和技术管理人员、甚至普通网络用户研究的问题。
Attack and defense in network are constantly conflicting and contradictory, but are also related to each other and even complementary to each other.
网络上的攻击和防御始终是对立、矛盾的,但又是相辅相成、互相联系的。
Attack, defense and the tactics involved in them result in network conflicts.
攻击、防御和它们彼此的策略构成了网络对抗。
According to the characteristics of network counterwork, discussed methods of network attack and network defense.
针对网络对抗的特点,探讨了网络攻击手段以及网络防御手段。
These losses, as the Defense Department said, have degraded ISIL's trans-regional attack and facilitation network, and are forcing ISIL fighters to increase their focus on internal security.
这些领导人的损失,如美国国防部所说,降低了IS跨区域袭击和促进恐袭网络运转的能力,并迫使IS分子将更多的经历分散到内部安全上。
This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.
该文从计算机的网络安全及防御措施来展开,指出了常见的四种网络攻击及其防御措施。
Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。
Program design, network technology, hacker attack and defense, and other e-books.
程序设计、网络技术、黑客攻防等各种电子书。
Due to its significance in the nowaday national economy, the network forms the main battlefields for the information security's attack and defense.
由于网络在当今世界国民经济中的重要性,网络也就成为信息安全攻防的主战场。
Due to its significance in the nowaday national economy, the network forms the main battlefields for the information security's attack and defense.
由于网络在当今世界国民经济中的重要性,网络也就成为信息安全攻防的主战场。
应用推荐