• In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.

    虚拟空间里,这个规则意味着不能规划庞大计算机网络攻击即使是一个军事网络也不能够排除民用网络受到牵连。

    youdao

  • "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    社会工程有关计算机通过向天真的问题,计算机网络用户信息收集往往计算机网络进行恶意攻击一步

    youdao

  • Network attackers steal other 's private information, attack other people' s computer system and even commit a crime by network.

    网络攻击者通过网络窃取别人个人信息攻击别人系统甚至利用网络攻击进行犯罪

    youdao

  • This algorithm which acts as a security conception of computer and network system is valid and actual and its capacity of detecting attack has very great practical value.

    算法作为一种提供计算机网络系统安全概念检测攻击能力有效符合实际的,且具有较的实用价值。

    youdao

  • An attack effect evaluation model of computer network based on network entropy was proposed in this paper.

    提出基于网络信息熵计算机网络攻击效果定量评估模型

    youdao

  • It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.

    通过监测计算机网络计算机系统实现内部攻击外部攻击和操作的实时保护,并收集的信息进行分析。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.

    科学连线报道近日美国科学家进行首次模拟电脑黑客攻击人类大脑的实验。

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • Network attackers steal other's private information, attack other people's computer system and even commit a crime by network.

    网络攻击者通过网络窃取别人个人信息攻击别人系统甚至利用网络攻击进行犯罪

    youdao

  • But at the same time, the attack of computer virus is increasing every day on computer and network, and the destructive is becoming more serious.

    与此同时计算机病毒计算机网络攻击一劳永逸,并且破坏性日趋重大。

    youdao

  • With the prevalent of network application, network attack, illegal access and computer virus increase day by day. The problem of network security is more and more serious.

    随着网络应用普及,网络攻击非法访问计算机病毒攻击等日益增长,网络安全问题日益严峻

    youdao

  • Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.

    信息战现代战争重要作战样式,网络战是信息战的重要组成部分分布式网络化计算机系统信息作战实施攻击防护首要作战目标

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定