Carrying the detection on worm attack out by the attack-tree model.
利用攻击树模型对蠕虫攻击进行检测。
From numeric results, we observe that multicast-worm attack performance is very sensitive to these fac...
根据数值结果得出组播蠕虫的攻击性能与几个因素密切相关。
Internet worm attacks, as a typical attack method of the Internet, with a wide range of attacks and difficult to remove, recently drew a high degree of attention.
网络蠕虫作为一种典型的互联网攻击手段,具有攻击范围广、破坏力强并且难于清除的特点,近来已受到了高度的关注。
The result, generically, is the same: a worm ACTS as an excellent attack vector for an attacker.
其结果通常相同:蠕虫成为攻击者出色的攻击平台。
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
Security experts widely believe that the worm was built as part of a state-backed attack on Iran's nuclear program.
安全专家们普遍认为病毒是国家背后支持攻击伊朗核计划的一部分。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
If you have got a ear worm you can suffer an attack of it simply by someone mentioning the tune, without having to hear it.
如果你被耳朵虫“侵袭”的话,你会仅仅因为别人提一下这个旋律,并没有真正听见这首歌,耳朵虫就会再次来袭,一遍又一遍的重复其最初的那首歌。
Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
应用推荐