• NVS is based on Trojan horse architecture and facing to network attack.

    基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    youdao

  • As a means of network attack, IP cheating has been put more and more attention in recent years.

    IP欺骗作为网络攻击一种手段近年被人们越来越重视

    youdao

  • This paper expounds the characteristics of network attack, and puts forward corresponding measures.

    本文阐述网络攻击特点提出网络安全的防范措施。

    youdao

  • Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.

    脆弱性复杂网络系统固有本性,是网络攻防焦点

    youdao

  • The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.

    网络攻击效果评估指标之间权重分配进行评估一个关键问题

    youdao

  • The severity of the network attack mean the degree of danger suffered by whole system from network attack.

    网络攻击危害是指网络攻击整个应用系统造成危害的程度

    youdao

  • Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.

    缓冲区溢出攻击互联网普通也是危害最大的一网络攻击手段

    youdao

  • This paper introduces the status quo of network attack classification summarily, and the trend is analysed.

    概要介绍了国内外关于网络攻击分类技术的研究现状对其发展趋势进行了分析。

    youdao

  • Based on abduction inference, a method of network attack process analysis for incident response was designed.

    针对事后入侵响应,提出了一种基于引理推理攻击过程分析方法

    youdao

  • In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.

    文章建立了基于DFA攻击模型此基础上利用Z语言之进行了有效的形式化描述

    youdao

  • According to the characteristics of network counterwork, discussed methods of network attack and network defense.

    针对网络对抗特点探讨了网络攻击手段以及网络防御手段。

    youdao

  • Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    youdao

  • This paper investigates network security problems from the point of view of the evaluation of network attack effect.

    该文评估网络攻击效果角度研究网络安全问题

    youdao

  • What's more, the research of backbone topology is strategetic and of great importance in network attack and defense.

    更重要的是骨干网拓扑结构研究具有战略性,网络攻防中的作用举足轻重。

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

  • Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.

    目前传统被动防御技术无法应对不断增加大规模网络攻击行为

    youdao

  • Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    主要方式网上教授病毒木马制作技术各种网络攻击技术;

    youdao

  • The model was suitable for describing complicated network attack, which could reduce the scale of state space effectively.

    模型能够有效缩减状态空间规模适合复杂网络攻击建模。

    youdao

  • The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.

    网络攻击防护一对矛盾严格地没有绝对的网络安全

    youdao

  • A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.

    文中设计出了一个分布式网络攻击测试系统模块化的体系结构使系统具有良好可扩展性

    youdao

  • With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.

    随着互联网飞速发展网络攻击安全防护技术日益受到关注。

    youdao

  • As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.

    前面所启用WebSphereApplicationServer安全性使得大多数内部传输使用ssl保护不受各种形式网络攻击

    youdao

  • As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.

    作为信息安全防御技术对立面网络渗透技术信息安全领域里扮演重要角色

    youdao

  • This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.

    该文计算机网络安全防御措施展开指出常见网络攻击及其防御措施。

    youdao

  • To solve the security problem in network, based on the ideas and the methods of network cybernetics, the model of network attack and defense was proposed.

    基于网络控制论基本概念原理,解决网络安全问题提出了一种网络攻防控制模型

    youdao

  • With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.

    随着网络安全领域研究深入网络服务广泛应用人们网络攻击数据集需求量逐渐增大。

    youdao

  • This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    给出一个网络攻击模型模型将攻击过程归纳若干阶段详细地分析了黑客阶段采用技术方法。

    youdao

  • Second, the expert system adopted currently by most intrusion detection products have high false alarm rate because the network attack means change variably.

    第二二当前绝大多数入侵检测产品采用专家系统网络攻击手段变化多样,导致误报漏报率太高

    youdao

  • Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.

    网络节点之间存在安全依赖关系前提下,提出一个基于贝叶斯方法的网络攻击定位追踪模型

    youdao

  • Under the assumption of security dependence relation among different network nodes, a Bayesian model is put forward for locating and tracing a network attack.

    网络节点之间存在安全依赖关系前提下,提出一个基于贝叶斯方法的网络攻击定位追踪模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定