• 因此对于工作中得出的相关数据分析结果非常感兴趣,这些数据最近发表赛门铁克关于攻击工具恶意站点报告中

    So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.

    youdao

  • 经过分析获取了目前使用最广泛的两种攻击工具以下它们进行简短说明

    During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.

    youdao

  • 嗅探、分析一直管理员发出可能出现入侵的警报,Snort能够保护工作成果,使之免受攻击

    From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.

    youdao

  • ‘形式分析承诺这个小节中讨论一个攻击分析阶段例子

    An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.

    youdao

  • 文中结合实验结果增强剪切攻击鲁棒性的技术进行分析

    A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.

    youdao

  • 由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文

    Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    youdao

  • 第四简单介绍了当前一个主流攻击方法快速相关攻击结合分析广义序列的安全性进行了讨论

    In chapter four, a brief review of fast correlation attacks is given, then an attack to generalized self-shrinking sequences is discussed by combining with entropy analysis.

    youdao

  • 全面分析攻击方案基础上,构造了一种增强代理多重签名方案。

    Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.

    youdao

  • 针对事后入侵响应,提出了一种基于引理推理攻击过程分析方法

    Based on abduction inference, a method of network attack process analysis for incident response was designed.

    youdao

  • 本文首先冗余事件关联特征进行系统分析包括攻击类型关联特征空间关联特征、时间关联特征。

    This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.

    youdao

  • 通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型特点进行了讨论

    Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    youdao

  • 提出了数据分析特征滤波器假设检验融合决策等过程组成隐藏攻击方法

    In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.

    youdao

  • 论文信息隐藏方面主要工作就是围绕两种应用展开,内容涉及图像乱、图像信息隐藏隐藏分析攻击技术等方面。

    In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.

    youdao

  • 差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    youdao

  • 然而攻击建模威胁分析工具方面的研究仍处于摸索阶段。

    However, insider attack modeling and threat analysis tools have not been evolved at the same rate.

    youdao

  • 进一步提高密码芯片安全性,密码芯片必须防止简单能量分析差分能量分析攻击

    To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.

    youdao

  • 最后给出了对该类方案已知明文的同态攻击方法,弥补了该类方案理论分析上的不足

    Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.

    youdao

  • 本文对ARP病毒攻击原理详细探讨分析

    This article has made the detailed discussion and the analysis to the ARP virus's attack principle.

    youdao

  • 本文计算机病毒及木马起源现状分析开始着手,对上百流行木马的常见攻击手段进行追踪分析,从中寻求相似性

    This paper begins with the analysis of the origin and status of the Trojan viruses, then tracks and analyzes hundreds of popular Trojan common attack means to seek their similarity.

    youdao

  • 安全分析结果表明,与L - L - C - Z门限代理协议相比改进门限代理签密协议能够承受接收方公钥替换攻击

    Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.

    youdao

  • 现实世界动物行为分析为依据,建立了合理的敌对群体行为的通用攻击模型

    Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.

    youdao

  • 由于功耗分析实现简单成功率高等优点,成为具威胁旁路攻击方法之一

    The power analysis attack is simple and has a high successful rate, is becoming one of the most effective side channel attacking methods.

    youdao

  • 文章分析ARP协议工作原理安全缺陷攻击原理攻击方式基础,详细论述基于ARP协议攻击的防御方法

    This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.

    youdao

  • 针对计算机系统安全故障方法网络信息系统的攻击方法应用了这一安全分析建模工作。

    The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    youdao

  • 提出了匿名通信系统中的统计攻击模型,对两种攻击模型的攻击能力定量分析

    Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    youdao

  • 理论分析仿真实验表明算法具有较高安全保密性能攻击性能。

    Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.

    youdao

  • 扩展诚实理想分析模型不仅继承了理论有关性质而且适应猜测攻击分析

    The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.

    youdao

  • 网络攻击行为频度复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们关注

    The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.

    youdao

  • 网络攻击行为频度复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们关注

    The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定