The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.
通过实例分析证明了算法模型适合全面分析网络安全性和攻击者可能采取的行为方式。
In the fourth chapter, there are a new model of artificial immune system for network security and some analysis about the model.
第四章提出了人工免疫网络安全模型,并对其进行一定的理论分析。
This dissertation is based on the analysis of common architecture of active network and the security problems of SENCOMM, and discusses its hidden dangers, needs and trusts model.
本文基于对主动网络通用体系和SENCOMM的安全缺陷的分析,探讨其安全隐患、需求和信任模型。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
It gives the definition and model, clarifies the classification and implementation method, and explains the effect of correlation in network security information analysis...
给出关联分析的定义和模型,对关联分析的分类和实施方法进行了阐述,并结合相应事例说明了关联分析在网络安全信息分析中的作用。
This paper makes the security analysis from the sight of the active network node, put forward a series of security measures and build a new security model of active network node based on them.
本文从主动节点的角度进行安全性分析,提出了一系列安全防范措施,并在此基础上设计了一种主动网络节点的安全体系模型。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
应用推荐