• 通过模拟攻击实验验证了检测方法可行性

    The feasibility of the scheme is validated through the simulated test.

    youdao

  • 显然是一个必须防止模拟攻击因此也会违背隐私权

    This is obviously a must-have to prevent impersonation attacks and, consequently, breach of privacy.

    youdao

  • 然后按照一定方法模拟攻击行为,生成攻击数据

    Then the normal data and the attack data would be mixed in a definite proportion to product mixture data.

    youdao

  • 同时针对单词沙拉攻击几种过滤器上进行模拟攻击实验

    At the same time, it does simulation attack experiments in some kinds of filters concerning the word salad attack.

    youdao

  • 基于NLANR追踪网络流量模拟攻击数据实验证实原型系统有效性。

    The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.

    youdao

  • 该文采用攻击模型模拟攻击行为,并提出了一个基于攻击树模型原理攻击规范语言

    This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.

    youdao

  • 提出了一个基于威胁评估模拟攻击的安全风险评估模型设计实现了网络安全评估原型系统

    A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.

    youdao

  • 俄罗斯军机本周近距离飞越波罗美国驱逐舰进行模拟攻击飞行,美国对此表示关注

    The U. S. expressed concern over Russian military aircraft flying apparent simulated attack passes near a U. S. destroyer in the Baltic Sea over the course of two days this week.

    youdao

  • 提取目标系统及其弱点信息攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态给出生成算法。

    By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.

    youdao

  • 基于一体化体系结构模拟攻击牺牲主机背景流量产生器,实现各种网络攻击会话真实复现及其与背景流量的混合发送。

    Furthermore, the system simulates the attacking host, sacrificed host and background traffic host based on the synthesized architecture to realize the real creation of attacking sessions and I...

    youdao

  • 麦克纳马拉认为通过模拟攻击对抗REM睡眠期所做的帮助我们对待真正的攻击rem睡眠所做的梦一般支持合作性行为

    McNamara thinks that by simulating aggressive encounters, REM dreams help us cope with real aggression, whereas non-REM dreams support cooperative behaviour.

    youdao

  • 基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标攻击路径

    An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.

    youdao

  • 今天我们将要看到登陆突袭实战训练,其间模拟的敌军登陆海军陆战队攻击

    Today we'll see one fighting training of a landing assault battalion with imitations of enemy landings and marines attacks.

    youdao

  • 该机的首次飞行测试2011年进行,攻击能力测试采用模拟的方式进行。

    The first flight test will take place in 2011 and weapons capabilities will be simulated.

    youdao

  • 演习模拟一次协同网络攻击,目标是信息技术通信化学交通系统设施

    The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

    youdao

  • 这种攻击通过模拟ads - B数据报文地面空管人员显示屏飞行员跟踪显示屏建立飞机信号

    This attack mimics the format of ADS-B data packets to create fake aircraft signals, either on the ground controller's screen or on the pilot's tracking display.

    youdao

  • 研究者同时还蟑螂阶段进行战斗,并用计算机进行模拟,从而验证中等大小的蟑螂最有攻击

    The researchers also staged fights between cockroaches and created a computer simulation to confirm that midsize cockroaches are the most aggressive.

    youdao

  • 全新攻击方法模拟公司层级某些恶意广告活动使用代理网关”)作为中间管理者掩盖恶意活动。

    The new attack method can Simulated company level: some malicious advertising activities using the proxy (or gateway) as the middle manager, cover up malicious activities.

    youdao

  • 在该系统中,研究人员可以模拟外国势力黑客攻击

    The system will allow researchers to simulate attacks by foreign powers and from hackers.

    youdao

  • 如果一个用户Kerberos密码攻击窃取攻击者就能够模拟用户。

    If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.

    youdao

  • 确保AmazonSQS请求无法攻击捕获回放模拟有效用户

    This ensures that the request to Amazon SQS cannot simply be captured by an attacker and replayed, thus mimicking the valid user.

    youdao

  • 女孩着和警方画像专家一起模拟拼绘攻击人的画像

    The girl sat down with a police artist to compile a Photofit of her attacker.

    youdao

  • 模拟实验表明TVCA算法提高计算效率抵抗恶意攻击方面取得良好效果

    The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.

    youdao

  • 无人机可以模拟战斗机攻击动作使打靶变得更真实

    The drone could also simulate the manoeuvres of fighters and attackers to make the target practice more realistic.

    youdao

  • 这种分子模拟,意免疫系统口腔感染反应时,也同时攻击了机体的蛋白质因此导致了动脉疾病的发生。

    This molecular mimicry means that when the immune system reacts to oral infection, it also attacks host proteins, causing arterial disease.

    youdao

  • 伦敦2012年奥运会计算机运行系统进行模拟网络攻击

    Simulated cyber attacks will be carried out on the computer systems running London's 2012 Olympic Games.

    youdao

  • 科学连线报道近日美国科学家进行首次模拟电脑黑客攻击人类大脑实验

    According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.

    youdao

  • 文中以某末修子母弹攻击机场跑道例,用统计试验数值模拟以及CADET三种方法计算了末修子母弹对机场跑道的射击效能

    In this paper, the shooting efficiency for terminal correction sub-munition to airport runway is calculated by three methods:Monte-Carlo method, Numerical Value simulation method and CADET.

    youdao

  • 本文针对近期网络危害比较大ARP欺骗技术讨论对象攻击模拟、感染主机定位相关实践性试验等为重点

    This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.

    youdao

  • 本文针对近期网络危害比较大ARP欺骗技术讨论对象攻击模拟、感染主机定位相关实践性试验等为重点

    This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定