More esoteric space research has ideas such as sending small satellites to act as “guardian angels”, detecting possible attacks against the big birds.
更秘密的太空研究则设想,比方说可以发射小卫星充当“守护天使”,来侦测针对大卫星的可能攻击。
Common web attacks protection - detecting common web application security attacks.
常见的Web攻击防护——对常见的Web应用安全攻击进行检测。
It is shown that this model of data collection establishes the basis of collaborative detection and greatly improves the capability of detecting distributed attacks.
结果表明,这种数据收集模型为协同检测奠定了基础,提高了对分布式攻击的检测能力。
To resolve the problem of detecting Distributed Denial of Service (DDoS) attacks, a dynamic threshold detection method based on fuzzy logic was proposed.
针对分布式拒绝服务攻击的检测问题,提出基于模糊逻辑的动态的阈值检测方法。
The attacks on steganography is referred as to steganalysis, study on which mainly concerns about detecting the existence of hidden information.
对隐写术的攻击被称为“隐写分析”,目前,隐写分析的研究主要集中于检测隐蔽信息是否存在。
This paper is aimed at detecting the backdoor attacks and design defects which might be embedded in logic chips, so as to insure the salty and creditability of the information in electronic equipment.
可编程逻辑器件安全性漏洞检测平台正是为了检测出逻辑芯片内可能存在的攻击后门和设计缺陷而研制的,从而确保电子设备中信息安全可靠。
On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.
另一方面,蜜罐作为一种新兴的主动防御技术,具有收集数据量小、价值高,能检测到未知攻击等优点。
More esoteric space research has ideas such as sending small satellites to act as "guardian angels", detecting possible attacks against the big birds.
更秘密的太空研究则设想,比方说可以发射小卫星充当“守护天使”,来侦测针对大卫星的可能攻击。
The original image is not needed during the watermark detecting process. The experimental results show that the algorithm has a better transparency and can resist various attacks. Especially the...
根据本算法的实验结果,该算法具有较好的透明性,对各种攻击有较强的顽健性,尤其是增强了小波域水印在面临裁剪攻击和联合攻击时的顽健性。
The original image is not needed during the watermark detecting process. The experimental results show that the algorithm has a better transparency and can resist various attacks. Especially the...
根据本算法的实验结果,该算法具有较好的透明性,对各种攻击有较强的顽健性,尤其是增强了小波域水印在面临裁剪攻击和联合攻击时的顽健性。
应用推荐