...伪装攻击 [gap=1181]V-HOP secure localization algorithm; symmetric code encryption; wormhole attack; impersonation attack ...
基于1834个网页-相关网页
...络安全;伪装攻击;入侵检测; shell 命令;异常检测; Markov 链 [gap=1670]Key words: network security; masquerade attack; intrusion detection; shell command; anomaly detection; Markov chain ..
基于22个网页-相关网页
SSL中针对伪装攻击的技术改进-工程技术 关键词: ssl;伪装攻击;信息安全 [gap=486]keywords:ssl;disguised attack;information safety
基于12个网页-相关网页
... Masquerading channels 植入通道 Masquerading Attack 伪装攻击 Address Masquerading 一种地址假装 ; 种地址伪装 ...
基于8个网页-相关网页
·2,447,543篇论文数据,部分数据来源于NoteExpress
训练有素的黑客,可以伪装攻击来源,让们看上去他是在某个城市,而实际却是另一个国家。
But well-trained hackers can disguise their origin of attack, making it seem they're in one city when they're actually in another country.
SARP通过使用专门的映射服务器可实现IP地址到硬件地址的安全映射,可以有效地避免非法用户对地址信息的纂改、重播以及实施ARP伪装攻击。
SARP can realize the safety resolution from IP address to hardware address, thus address information can effectively avoid being distorted and replayed by the illegal us...
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
应用推荐