After that, based on the precise analysis and detailed design of limit rate、attack identification、strategy management and system protection, the function of security anti-attack system has been accomplished.
然后,在对安全防攻击系统的限速处理、攻击识别、策略管理和系统防护功能等子模块具体分析和详细设计的基础上实现了该系统的功能。
参考来源 - WX6103型无线控制器的攻击识别及防护研究·2,447,543篇论文数据,部分数据来源于NoteExpress
The attack, thought up by hacker Samy Kamkar, exploits shortcomings in many routers to find out a key identification number.
这种由黑客萨米·卡门卡想出来的攻击方法,利用存在于很多路由器中的众多漏洞,查出一个关键的身份识别号。
In the past, content owners have used identification methods as a means of identifying unauthorized content for the sake of calling out the attack dogs and sending take-down notices.
过去,内容所有者通常采用识别技术来判断未经授权的内容使用,并主动出击,追讨责任。
It is also vital that capabilities of night target identification, mobile land target survilliance, combat command and control and precision of attack should be strengthened.
加强夜间目标识别和非通视条件下地面活动目标侦察、作战指挥和打击能力;
应用推荐