单词 | network attack | ||||||||||
释义 | network attack
更多释义 收起释义 例句释义: 网络攻击,网路攻击,网路攻击保护 1. Extracting a specific subset from the metrics can be used to describe the flow of network attack characteristics. 从中提取的特定的子集在理论上可用于刻画网络流量中的攻击行为特征。 www.ceps.com.tw 2. But the need for such changes underlines the vulnerability of the company's security before the PlayStation Network attack. 但是,对于此类变化的需求,凸显出在PlayStationNetwork游戏网络受到攻击之前,索尼在安全方面存在的脆弱性。 www.ftchinese.com 3. "The accesses and skills required for these intrusions are similar to those necessary to conduct computer network attack, " the report says. 报告称:“这些用于入侵的方法与技能与计算机网络战的要求基本等同。” blog.sina.com.cn 4. Penetration testing model is the key technology of the penetration testing, but at present no model can simulate the network attack process. 渗透测试模型是渗透测试的关键技术,但现有的渗透测试模型难以模拟网络攻击过程。 www.dictall.com 5. Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack. 目前,传统的被动防御技术将无法应对不断增加的大规模网络攻击行为。 kns50.chkd.cnki.net 6. Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading. 使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。 www.ibm.com 7. Recently, automatic generating of network attack graph is a hot topic for the domestic and overseas researchers. 网络攻击图的自动生成是近年来国内外研究的一个热点。 www.ceps.com.tw 8. Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means. 缓冲区溢出攻击是互联网上最普通,也是危害最大的一种网络攻击手段。 www.bing.com 9. As a mean for describing network attack pattern and modeling, attack tree is characterized by structure and reutilization. 攻击树是一种网络攻击形式化描述和建模工具,具有结构化、可重用等优点。 www.ceps.com.tw 10. The model was suitable for describing complicated network attack, which could reduce the scale of state space effectively. 该模型能够有效缩减状态空间的规模,适合对复杂网络攻击建模。 www.joca.cn 1. In the network attack that launched in the light of Estonia 2007, among them a means namely psywar . 在2007年针对爱沙尼亚发起的网络攻击中,其中一个方式即心理战。 dictsearch.appspot.com 2. Cyber war methods include computer network attack, transmitting computer viruses and other destructive hacking. 网战战法包括,攻击电脑网络系统,发送电脑病毒以及其它破坏性黑客行为。 www.bing.com 3. Unique setting, add close managing, prevent virus and network attack. 独特设置、加密治理,防病毒和网络攻击。 itzhe.cn 4. In order to improve the security assessment of large-scale networks analysis studies are made on several network attack models and tools. 为了完善大型计算机网络的安全分析,本文对几种网络攻击分析模型和工具进行对比研究。 www.ceps.com.tw 5. 1 . Network traffic volume increases if there are infected PCs in the network, because network attack starts from these PCs. 网络流量的增加,如果有受感染的电脑网络中,网络攻击,因为从这些电脑。 bbs.360.cn 6. To prevent malicious network attack, more and more networked hosts use the personal firewall. 为了防范恶意的网络攻击行为,越来越多的联网主机安装使用了个人防火墙。 www.boshuo.net 7. The design and realization of a practical and effective training analogous system in the network attack and defense 一个实用、高效网络攻防训练模拟系统的设计与实现 www.ilib.cn 8. attack graph; network attack modeling; vulnerability detection; scalability; network security analysis; network key point; 攻击图;网络建模;漏洞检测;可扩展性;网络安全浅析浅析;网络关键节点; www.zidir.com 9. Design and Implementation of an Open Signature Database for Network Attack 开放式网络攻击特征库的设计与实现 www.ilib.cn 10. Design and Realization of a Network Attack Generator 一种网络攻击流量生成器的设计与实现 www.ilib.cn 1. Classification of network attack source tracing technologies 网络攻击源追踪技术的分类和展望 www.ilib.cn 2. Application of Analytic Hierarchy Process to Network Attack Effect Evaluation 层次分析法在网络攻击效果评估中的应用 www.ilib.cn 3. The distributing network attack indication warning system model base on analysis policy of log files 基于日志分析策略的分布式网络入侵预警系统模型 service.ilib.cn 4. Design and realization of network attack intelligent decision support system 网络攻击智能决策支持系统的设计与实现 ilib.cn 5. Research on Formal Description Techniques of Network Attack Procedures 网络攻击过程的形式化描述方法研究 www.ilib.cn 6. Network Attack Classification on Results and Formal Description 基于攻击效能的网络攻击法分类与形式化描述 www.ilib.cn 7. Exploration and Analysis for the Tracing Network Attack Method 网络攻击追踪方法的探索与分析 ilib.cn 8. Research on the Packets Marking Schemes of Reconstructing-Path in Network Attack 网络攻击路径重构中的报文标记方案研究 www.ilib.cn 9. Research of Online Evaluation Model and Algorithm for Network Attack Effect 网络攻击效果在线评估模型与算法研究 www.ilib.cn 10. An extensible distributed testing system for network attack 一种可扩展的分布式网络攻击测试系统 www.ilib.cn 1. Application of Network Cybernetics in Network Attack and Defense 网络控制论在网络攻防中的应用 www.ilib.cn 2. Theft of participant account information by network attack 攻击网络以窃取用户的帐号信息 boinc.equn.com 3. Realize the initiative recovery of long-distance network attack 实现网络远程攻击主动防御 www.ilib.cn 4. Design of typical network attack detection algorithm 典型网络攻击检测算法的设计 service.ilib.cn 5. Model of evaluating severity of network attack on concrete computer 针对具体主机的网络攻击危害度评估模型 www.ilib.cn 6. The Current Situation of Network Attack and Defense Resistance 网络对抗的现状及防御抵抗 www.ilib.cn 7. Analysis of Methods for Network Attack and Recovery Strategy 网络攻击方式的分析及相应的防御策略的研究 service.ilib.cn 8. Computer Network Attack and Defense Brief Analysis 计算机网络攻击与防御浅析 www.ilib.cn 9. Design and Implementation of Network Attack Trap System 网络攻击诱骗系统的设计与实现 www.ilib.cn 10. Survey of network attack classification 网络攻击分类技术综述 service.ilib.cn 1. Techniques for network attack detection 网络攻击检测技术 www.ilib.cn 2. Design of Network Attack and Defense Training Platform 网络攻防训练平台设计 www.ilib.cn 3. Research of Mining Multi-Stage Network Attack Profiles 多阶段网络攻击模式挖掘研究 www.ilib.cn 4. Knowing the Network Attack and the Security Protection Skills 认识网络攻击与安全防护技巧 www.ilib.cn 5. An Introduction of Preceding Network Attack and some Countermeasures 网络攻击前奏介绍与对策 www.ilib.cn 6. Key Technologies of Wireless Network Attack 无线网络攻击的关键技术 www.ilib.cn 7. Honeypot System to Detect the Unknown Network Attack 检测未知网络攻击的蜜罐系统 service.ilib.cn 8. Protecting network attack based on combination of packet filter and transparent proxies 基于数据包过滤和透明代理相结合的防网络攻击 www.ilib.cn 9. Physical isolation technology: the safest way to protect against network attack 抵御网络攻击的最安全手段——物理隔离技术 www.ilib.cn 10. Modeling on the Results of Organized Network Attack 有组织的网络攻击行为结果的建模 www.ilib.cn 1. A Scheme of Reconstructing Network Attack Path 一种网络攻击路径重构方案 www.ilib.cn 2. Study on the method to generate network attack graphs 网络攻击图生成方法研究 www.ilib.cn 3. A Method of the Network Attack Process Analysis Based on Dynamic Linking Inference 一种基于动态建链推理的网络攻击过程分析方法 ilib.cn 4. Study on Detection Technology of Complicated Network Attack Based on Related-Event 基于关系事件的网络复杂攻击检测技术研究 www.ilib.cn 5. Classified Way of Network Attack Based on the Analysis of Protocols 基于协议分析的网络攻击分类方法的研究 service.ilib.cn 6. The Realization of the Network Attack based on Buffer Overflow 基于缓冲区溢出的网络渗透技术的实现 www.ilib.cn 7. A Network Attack Plan Recognition Algorithm Based on the Extended Goal Graph 基于扩展目标规划图的网络攻击规划识别算法 www.ilib.cn 8. The Phenomenon of Network Attack 网络攻击现象 www.ilib.cn 9. Method of network attack process analysis based on abduction inference 一种基于引理推理的攻击过程分析方法 www.ilib.cn 10. Research of Network Attack Effect Evaluating Based on Rough Set 粗糙集理论在网络攻击效果评估中的应用研究 scholar.ilib.cn 1. Formulization of network attack pattern based on improved attack tree 基于改进攻击树的网络攻击模式形式化研究 www.ilib.cn 2. The Study on Formalization of Network Attack 网络攻击的形式化建模探讨 www.wanfangdata.com.cn |
||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。