Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.
深入系统地分析了攻击树模型在抗攻击测试中应用。
This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.
该文采用攻击树模型来模拟攻击行为,并提出了一个基于攻击树模型原理的攻击规范语言。
This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.
该文采用攻击树模型来模拟攻击行为,并提出了一个基于攻击树模型原理的攻击规范语言。
应用推荐