英语人>网络例句>攻击目标 相关的搜索结果
网络例句

攻击目标

与 攻击目标 相关的网络例句 [注:此内容来源于网络,仅供参考]

A study of target assignment and squencing attack in air combat of multi-fighters against multiple targets is presented.

研究了多机协同空战中多目标攻击的目标分配和攻击排序的过程和方法。

First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given.

首先介绍攻击仿真的测试目标和内容,并提出了攻击仿真系统和仿真平台的设计和实现的详细方案;同时,在此基础上,对该平台的设计和实现的3个关键技术:测试数据的选择、攻击技术的分类研究、攻击测试域及其划分等进行了进一步的分析,最后给出并分析了实验测试结果。

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

U.S. network security monitoring organization Shadowserver Foundation volunteers Stephen A Daer said that they found the President of Georgia, site of the attack order is a "zombie" network attacks, that is secretly controlled by hackers over computer networks, to the target site Sending a large amount of requests and caused huge traffic, from the target site visit to slow and stop services.

阿达尔表示,他们发现攻击格鲁吉亚总统网站的命令是一种&僵尸&网络攻击,即由黑客暗中控制多个计算机网络,向目标网站发送大量请求,造成巨大流量,引起目标网站访问缓慢,并停止服务。

The method of fuzzy partitional cluster algorithm is applied to classify the multi-target in the air combat,to be aimed at the shortcoming of traditional algorithm in calculating attack strategy difficultly.This algorithm reduces the computational complexity,and raises the operating speed by considering multi-target as a whole.

针对传统多机多目标攻击不易解算攻击任务分配,且计算量大的问题,提出基于划分的多目标模糊聚类算法,该算法根据目标属性的相似性进行多目标分类,可以有效地降低多目标任务分配解算维数,减少运算量,提高解算速度。

By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.

建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。

Firstly, the article introduced the principle of SYN Flood attack, and then put forward the design and realization of the defense system, on this basis, according to the objectives and content of the defense attacks test, carried out the simulation attack and defense; and at last introduced the implementation of the attack and defense in detail.

首先介绍了SYN Flood的攻击原理,提出了防御系统的设计和实现方案;在此基础上,根据攻击防御测试的目标和内容,实施了仿真模拟攻击及防御;并详细介绍了攻击及防御实施的过程。

In the Solomon Islands, political turmoil turned into riots against Chinese and the people in Chinatown.

唐人街的华人成为攻击目标,所有的商铺成为打劫焚烧破坏的对象。

"I would like to express the wish that by the end of the third Five-Year Plan the need for satire will have disappeared in the Soviet Union," said Romanov,"leaving only a great need for humour, for cheerful laughter."

只是,现在他的对手们想让这位《真理报》的编辑靠边站,于是便将他的幽默感作为攻击目标

Professor James Paton was part of the team that found E. coli toxins target people who

Jaems Paton教授是发现大肠杆菌毒素以吃红肉或奶制品的人群为攻击目标的研究小组成员之一。

第7/29页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
推荐网络例句

He and Nina moved to California and lived at 2005 Ivar Street, Apt.

他和Nina搬到加州,并在2005年伊瓦尔街,公寓生活。

Droperidol ( potently inhibits transfected HERGchannels and this is the probable mechanism for QT prolongation.

氟哌利多有效地抑制了转染的 HERG 钾通道,可能是 QT 间期延长的机制。

The Nazi's cruel treatment of the Jews during the Second World War is beneath contempt .

二战期间纳粹对犹太人的暴行极其可鄙。