利用实验室环境对原型系统进行了性能、攻击测试。
In lab environment, we test the performance and the ability to keep up attack for prototype system.
深入系统地分析了攻击树模型在抗攻击测试中应用。
Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.
虽然攻击测试处理后相关系数值有所下降,但是仍能检测出水印。
The corresponding modulus has fallen down , but the watermark still can be detected.
本文提出了一个面向测试的协议攻击描述模型,以及相应的协议攻击测试算法。
A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.
因此,在模型中的信息收集以后可以被用来进行攻击测试,以评估网络的安全水平。
Thus, information gathered in the model can later be used to conduct testing attacks in order to evaluate the network security level.
文中设计出了一个分布式网络攻击测试系统,模块化的体系结构使该系统具有良好的可扩展性。
A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.
对模型和算法进行多种典型攻击测试实验,结果表明模型具有较高的检测率,并能有效降低误警率。
The experimental results show that the model has high detection rate, and which can deduce the false alarm rate effectively.
实验结论和攻击测试表明,该算法对JPEG有损压缩、滤波、附加噪声、剪切等各种图像处理的攻击有较强的鲁棒性。
Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
本文介绍了全光网络的组成结构,及攻击光网络的几种手段,分析了现存的攻击测试方法,讨论了光纤传感技术在全光网络攻击测试方法中的应用。
Current attack detection methods for all-optical networks were analyzed, and applications of optical fiber sensing technique were discussed in attack detection methods for all-optical networks.
我们采取了适当措施,来拦截发射到测试实验室的无线电干扰信号。在此以后,我们自己测试了这次攻击,证实了使用正确设备是有可能阻断信号的。
After taking appropriate measures to contain the RF interference to our test lab, we tested the attack out for ourselves, and were able to verify that it's possible with the right equipment.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
这项研究测试了两种疫苗的组合注射,采用“启动—提高”的办法,其中第一种疫苗启动免疫系统攻击艾滋病毒,而第二种疫苗则强化这一反应。
The study tested a two-vaccine combination in a "prime-boost" approach, where the first one primes the immune system to attack the HIV virus, and the second one strengthens the response.
如果您的测试计算机上有其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重的问题,例如拒绝服务攻击。
If there are other users of your test machine, they must be aware of your test plans — otherwise they may think they are experiencing some severe problem such as a denial-of-service attack.
如果您用24小时对程序进行模糊测试而其依然无事,那么随后同种类型的攻击就不大可能再危及到它。
If you've fuzzed your program for 24 hours and it's still standing, then it's unlikely that further attacks of the same sort will compromise it.
然而一些观察家认为,BX - 1实际上是为了测试共轨型反卫星(ASAT)攻击所需要的某些能力。
However, some observers have concluded that the BX-1 was actually a test of some of the capabilities required for a co-orbital anti-satellite (ASAT) attack.
攻击者可以自动的在多个站点上进行测试。
The attacker can automate to go against multiple sites at one time.
作为测试的攻击是在宏达公司的Android-basedLegendandDesire手机上实施的,但是他相信在其他的Android手机上也一样可以。
The test attacks were conducted on HTC Corp's Android-based Legend and Desire phones, but he believed it could be conducted on other Android phones.
在模糊测试中,用随机坏数据(也称做fuzz)攻击一个程序,然后等着观察哪里遭到了破坏。
In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
如果使用的是XMLThreatprotection,确保它不会妨碍您的测试(出现可疑的XML - DOS攻击)。
If you are using XML Threat protection, make sure it does not block your test (because of suspecting XML-DOS Attack).
白帽黑客专家,指公司雇佣专家去测试他们的官网网站或email系统是否易受攻击。
White-hat hacking Experts hired by companies to test their websites or email systems for vulnerabilities.
如果开发者在使用Spring框架设计和测试应用的时候头脑中能对安全问题有个清楚且正确的认识的话,企业应用在部署之后也就不会那么容易遭到攻击了。
The right security awareness in the design and testing phase of applications using the Framework can protect enterprises from exploitation after deployment.
大多数紧急问题的发现:由于动态分析是作为一个黑客来测试这个应用程序的,因此它会找出与攻击者所发现十分相似的问题。
Discovery of the most critical issues: Since dynamic analysis tests the application as a hacker would, it finds the issues most likely to be discovered by attackers.
这种方法根本不会产生安全的代码,因为您无法创建足够多的测试来涵盖攻击者能做到的所有稀奇古怪的事情。
That approach simply won't produce secure code, because you can't create enough tests to represent all the odd things an attacker can do.
测试额外的安全性和可攻击性问题;例如,所部署应用程序上会间接伤害数据中心中其他应用程序的恶意攻击。
Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.
当测试一个抵御模糊攻击的应用程序时,不可能做纯黑盒测试,但通过一些明显的修改,基本的想法还是可以应用的。
When you're testing a fuzz-resistant application, you can't do pure blackbox testing, but with some obvious modifications, the basic ideas still apply.
在这样的测试期间,在CEH尝试攻击系统之前,应该为其提供有关基础设施的最少信息。
During such a test, the CEH is given minimal information about the infrastructure before he or she attempts to hack the system.
该机的首次飞行测试将在2011年进行,而攻击能力测试采用模拟的方式进行。
The first flight test will take place in 2011 and weapons capabilities will be simulated.
让程序员们在阅读一个文件时测试每一个字节和每一个不变量似乎是无望的——但不这样做就会使程序易被模糊攻击。
Asking programmers to test each byte and every invariant when reading a file seems hopeless — but failing to do so leaves your programs vulnerable to fuzz.
应用推荐