• Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.

    网络通信模型基础上,进一步结合蠕虫传播特征本文提出蠕虫的攻击树模型。

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.

    深入系统分析攻击模型攻击测试应用

    youdao

  • This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.

    该文采用攻击模型模拟攻击行为,并提出了基于攻击树模型原理攻击规范语言。

    youdao

  • This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.

    该文采用攻击模型模拟攻击行为,并提出了基于攻击树模型原理攻击规范语言。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定