• The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Large networks attack can be researched base on the graph theory, because the character of its network connect and route of spread is related closely to weighted and oriented graph.

    由于大规模网络入侵网络连接上、传播路径上所体现出来特性中的赋权有图有着共同的特性,这使得在图论的基础进行大规模网络入侵检测的研究成为可能

    youdao

  • The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.

    发明有效地降低攻击算法开销,在提高发现网络攻击准确度的同时,不会降低发现过程时效性

    youdao

  • Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.

    针对网络安全分析研究要求,在已有研究的基础上,提出了一种灵活的网络攻击生成方法

    youdao

  • Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.

    针对网络安全分析研究要求,在已有研究的基础上,提出了一种灵活的网络攻击生成方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定