通过模拟攻击实验验证了检测方法的可行性。
The feasibility of the scheme is validated through the simulated test.
这很显然是一个必须防止的模拟攻击,因此也会违背隐私权。
This is obviously a must-have to prevent impersonation attacks and, consequently, breach of privacy.
然后按照一定的方法模拟攻击行为,生成攻击数据;
Then the normal data and the attack data would be mixed in a definite proportion to product mixture data.
同时,针对单词沙拉攻击,在几种过滤器上进行了模拟攻击实验。
At the same time, it does simulation attack experiments in some kinds of filters concerning the word salad attack.
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
该文采用攻击树模型来模拟攻击行为,并提出了一个基于攻击树模型原理的攻击规范语言。
This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.
提出了一个基于威胁评估和模拟攻击的安全风险评估模型,设计并实现了网络安全评估原型系统。
A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.
俄罗斯军机本周两天近距离飞越波罗的海的一艘美国驱逐舰并进行模拟攻击飞行,美国对此表示关注。
The U. S. expressed concern over Russian military aircraft flying apparent simulated attack passes near a U. S. destroyer in the Baltic Sea over the course of two days this week.
在提取目标系统及其弱点信息和攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态图,并给出其生成算法。
By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.
基于一体化的体系结构,模拟攻击机、牺牲主机和背景流量产生器,实现各种网络攻击会话的真实复现及其与背景流量的混合发送。
Furthermore, the system simulates the attacking host, sacrificed host and background traffic host based on the synthesized architecture to realize the real creation of attacking sessions and I...
麦克纳马拉认为,通过模拟攻击性对抗,REM睡眠期所做的梦会帮助我们去对待真正的攻击,而非rem睡眠所做的梦一般支持合作性的行为。
McNamara thinks that by simulating aggressive encounters, REM dreams help us cope with real aggression, whereas non-REM dreams support cooperative behaviour.
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
今天我们将要看到一场登陆突袭营的实战训练,其间有模拟的敌军登陆和海军陆战队攻击。
Today we'll see one fighting training of a landing assault battalion with imitations of enemy landings and marines attacks.
该机的首次飞行测试将在2011年进行,而攻击能力测试采用模拟的方式进行。
The first flight test will take place in 2011 and weapons capabilities will be simulated.
演习模拟了一次协同网络攻击,目标是信息技术、通信、化学和交通系统与设施。
The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
这种攻击通过模拟ads - B的数据报文,在地面空管人员的显示屏或飞行员的跟踪显示屏上建立假的飞机信号。
This attack mimics the format of ADS-B data packets to create fake aircraft signals, either on the ground controller's screen or on the pilot's tracking display.
研究者们同时还在蟑螂间分阶段进行战斗,并用计算机进行模拟,从而验证中等大小的蟑螂最有攻击性。
The researchers also staged fights between cockroaches and created a computer simulation to confirm that midsize cockroaches are the most aggressive.
全新攻击方法可模拟公司层级:某些恶意广告活动使用代理(或“网关”)作为中间管理者,掩盖恶意活动。
The new attack method can Simulated company level: some malicious advertising activities using the proxy (or gateway) as the middle manager, cover up malicious activities.
在该系统中,研究人员可以模拟外国势力和黑客的攻击。
The system will allow researchers to simulate attacks by foreign powers and from hackers.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。
If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
这确保了对AmazonSQS的请求无法被攻击者捕获并回放以模拟有效用户。
This ensures that the request to Amazon SQS cannot simply be captured by an attacker and replayed, thus mimicking the valid user.
女孩坐着和警方画像专家一起模拟拼绘攻击她的人的画像。
The girl sat down with a police artist to compile a Photofit of her attacker.
模拟实验表明TVCA算法在提高计算效率、抵抗恶意攻击等方面都能取得良好的效果。
The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.
无人机也可以模拟战斗机和攻击机的动作使打靶变得更真实。
The drone could also simulate the manoeuvres of fighters and attackers to make the target practice more realistic.
这种分子模拟,意即当免疫系统对口腔感染有反应时,它也同时攻击了机体的蛋白质,因此导致了动脉疾病的发生。
This molecular mimicry means that when the immune system reacts to oral infection, it also attacks host proteins, causing arterial disease.
伦敦2012年奥运会的计算机上运行系统,将进行模拟网络攻击。
Simulated cyber attacks will be carried out on the computer systems running London's 2012 Olympic Games.
据科学连线网报道,近日美国科学家进行了首次模拟电脑黑客攻击人类大脑的实验。
According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.
文中以某末修子母弹攻击机场跑道为例,用统计试验法、数值模拟法以及CADET三种方法计算了末修子母弹对机场跑道的射击效能。
In this paper, the shooting efficiency for terminal correction sub-munition to airport runway is calculated by three methods:Monte-Carlo method, Numerical Value simulation method and CADET.
本文针对近期在网络上危害比较大的ARP欺骗技术为讨论对象,以攻击的模拟、感染主机的定位和相关实践性试验等为重点。
This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.
本文针对近期在网络上危害比较大的ARP欺骗技术为讨论对象,以攻击的模拟、感染主机的定位和相关实践性试验等为重点。
This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.
应用推荐