go top

伪装攻击 [wěi zhuāng gōng jī]

网络释义专业释义

  impersonation attack

...伪装攻击 [gap=1181]V-HOP secure localization algorithm; symmetric code encryption; wormhole attack; impersonation attack ...

基于1834个网页-相关网页

  Masquerade attack

...络安全;伪装攻击;入侵检测; shell 命令;异常检测; Markov 链 [gap=1670]Key words: network security; masquerade attack; intrusion detection; shell command; anomaly detection; Markov chain ..

基于22个网页-相关网页

  disguised attack

SSL中针对伪装攻击的技术改进-工程技术 关键词: ssl;伪装攻击;信息安全 [gap=486]keywords:ssl;disguised attack;information safety

基于12个网页-相关网页

  Masquerading Attack

... Masquerading channels 植入通道 Masquerading Attack 伪装攻击 Address Masquerading 一种地址假装 ; 种地址伪装 ...

基于8个网页-相关网页

短语

伺服器伪装攻击 Server Spoofing Attack

密钥泄露伪装攻击 key compromise impersonation attack

战术攻击伪装 TACAM

  • masquerade attack - 引用次数:1

    参考来源 - 基于shell命令和多重行为模式挖掘的用户伪装攻击检测 Masquerade Detection Based on Shell Commands and Multiple Behavior Pattern Mining
    impersonation attack

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句

  • 训练有素的黑客可以伪装攻击来源,让们看上去某个城市实际却是另一个国家

    But well-trained hackers can disguise their origin of attack, making it seem they're in one city when they're actually in another country.

    youdao

  • SARP通过使用专门的映射服务器实现IP地址硬件地址安全映射,可以有效地避免非法用户对地址信息的纂改、重播以及实施ARP伪装攻击

    SARP can realize the safety resolution from IP address to hardware address, thus address information can effectively avoid being distorted and replayed by the illegal us...

    youdao

  • 黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    youdao

更多双语例句
$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定