• The different network flow graphs are given according to different attack intensity by changing parameter settings in the paper.

    通过调整相关的实验参数设置给出了不同攻击强度攻击子网的通讯流量

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定