查询词典 under attack
- 与 under attack 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Test research on the concrete resistance to chemical attack was conducted under different salt and acid attack condition.
对普通混凝土在各种盐类、酸类侵蚀介质作用下的抗化学侵蚀性进行了试验研究,测定了混凝土的侵蚀破坏率和混凝土中的氯离子含量。
-
The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.
攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。
-
The proposed scheme is secure against multisignature collusion attack, adaptive chosen-ID attack and forgeability under chosen-message attack.
拟议的计划是安全的对多重共谋攻击,自适应选择-编号攻击和锻造下,选择消息攻击。
-
Analyzing the isobar distribution under the flight condition of zero attack angle and ±5°attack angle when inlet starts and unstarts,the unstart of inlet can be concluded.
通过对不同攻角飞行条件下起动和不起动时压力分布的分析,得到进气道不起动的结论。
-
He described that, when a red-tailed eagle flying near a kingbird's nest and is ready to dive under the Go to their attack, when suddenly a bird flew up into the Eagles win the back, and used to attack eagle claw hook back.
他描述到,当时一只红尾老鹰飞近一只必胜鸟的巢穴,并准备俯冲下去对其进行攻击,这时必胜鸟突然飞上老鹰的背上,并用其钩爪攻击老鹰的背部。
-
The speed of attack of sodium sulfate is faster than the one of attack of magnesium sulfate under various factors.
在各种影响因素下,硫酸钠侵蚀破坏的速度比硫酸镁侵蚀快。
-
In this paper,we construct the transitive signature scheme based on bilinear pairings over elliptic curves or super elliptic curves,If one-more CDH problem is hard and standard signature scheme is unforgeable under adaptive chosen-message attack,our scheme is transitively unforgeable under adaptive chosen-message attack.
构造了基于椭圆曲线或超椭圆曲线上双线性对的可传递签名方案,并且证明了在one—more CDH问题是难的和标准签名方案是自适应选择信息攻击下不可伪造的条件下,该文的可传递签名是在自适应选择信息攻击下不可伪造的。
-
They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi's SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin's protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame.
在2007年,Fouladgar和Afifi首先提出了离线式SiDES协定,接著Lin也提出了TCD-RP协定,可让后端伺服器可以授权读取器辨识标签的资讯,但Fouladgar和Afifi的SiDES定理,会遭受重送攻击、伪造攻击、阻断服务攻击以及不具有向前安全性的特性;而Lin的协定虽然使用时戳来做授权的控制,但在相同的时间区段下运作,并不具有向前安全性的特性。
-
An improved shceme for the old double-way authentication access control scheme based on Harns digital signature is proposed. The new double-way authentication protocol of the improved access control scheme can prevent man-in-the-middle attack and replay attack. After strict formal analysis with BAN logic, the result have proved that the authentication protocol is secure. The improved access control scheme is realized by the mode of single-key-lock-pair. Under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method
作为对原双向认证访问控制方案的改进,改进后的双向身份认证协议可以很好的抵抗中间人攻击和重放攻击,经过严密的BAN逻辑形式分析和论证,结果表明该协议是安全的;改进后的访问控制方案用单钥-锁对方案实现,除保持了一般单钥-锁对方案的良好动态特性外,在不需要访问权限递增假设下,实现了用户对文件的多种访问控制权限,并大大减小了溢出问题的发生可能
-
To fall under judgment, came under condemnation 2 to descend from an erect to a prostrate position 2a to fall down 2a1 to be prostrated, fall prostrate 2a2 of those overcome by terror or astonishment or grief or under the attack of an evil spirit or of falling dead suddenly 2a3 the dismemberment of a corpse by decay 2a4 to prostrate one's self 2a5 used of suppliants and persons rendering homage or worship to one 2a6 to fall out, fall from i.e.
落下或落下到。。。。 1a1 被推倒 1b 隐喻。落在审判之下,被定罪 2 由直立的姿势跪下或伏倒在地上 2a 躺下,伏倒 2a1 跪下,躺平,俯伏 2a2 指被恐怖,惊吓,悲痛,或恶魔的打击所击溃或暴毙 2a3 指尸体因衰败而分解 2a4 俯伏,顺服 2a5 用於恳求乞求他人时或对人表示顺服或敬拜时 2a6 坠落,由。。。
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。