英语人>网络例句>攻击的 相关的搜索结果
网络例句

攻击的

与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

After discussion of the relation of MR〓 and ALT, an algorithm proposed by Zhongping Qin and Huanguo Zhang, two conclusions are obtained: if a weak key can be successfully attacked by the method of reduced echelon matrix, it can also be successfully attacked by a linear R〓R〓 transformation; meanwhile, there exists such a weak key that can be successfully attacked by the algorithm MR〓 or linear R〓R〓 transformation, but this key can not be successfully attacked by the algorithm ALT. For a NFA, according to the number of solutions for the image equation of its R〓R〓 transformation, there exist two sufficient criteria about its weak invertibility and weak inverse.

通过比较MR〓与覃中平和张焕国提出的攻击FAPKC加密情形的算法ALT,证明了如下结果:凡用约化梯阵方法能攻击成功,用线性R〓R〓变换也能攻击成功;同时,存在着用算法MR〓或线性R〓R〓变换攻击成功的弱密钥,用算法ALT攻击失败。

The intersexual aggression of male was significantly higher than the intersexual aggression of female and the intrasexual aggression of male. There was significant difference about male's aggression between two groups; but for female, there was no significant difference. The combat occurred intensely when two females met whether in male vs female or female vs female, but were both higher than the intrasexual aggression of male. With the increasing of meeting time, the male and female in female vs female decreased their aggression; the female in female vs male kept its aggression in high level. The component of aggression was resembled to the exhibition of aggression in every group.

同性个体间雄性动物的攻击水平显著高于同性个体间雌性动物的攻击水平和异性个体间雄性动物的攻击水平;同性个体间雌性动物的攻击水平和异性个体间雌性动物的攻击水平没有差异,但两者均高于异性个体间雄性动物的攻击水平;雄性动物和雌雌组中雌性动物的攻击行为均随着熟悉程度的增加而减弱;雌雄组中雌性动物的攻击行为在各时间段的差异不大。

Denial of Service is a deathful attack concept.

拒绝服务攻击 Denial of Service是一个非常致命的攻击概念,它让伺服器资源耗尽,直至不能提供服务,可分为本地攻击及网路攻击两种。

Methods:a total of 50 patients of manic with agressive behavor and 50 patients with no agressive behavor were compaired with their rebation data.results: the two groups were signifcent different in brms and the dinical charaters.imply that the active,agression factor,dinical character of agressive history,irritably of brms were the agressive behavor danger factors.conclusions: to give nurse intervene and heath cducation in manic with agressive behavor early could decrease the agessive behavor mostly.

采用对照分析法,对50例有攻击行为的躁狂症患者和50例无攻击行为的躁狂症患者的相关资料进行分析和显著性检验。结果:两组躁狂症患者在brms和临床特征上存在显著差异,提示brms的动作活动、敌意因子分和临床特征中既往有攻击史,易激惹、不合作及医护人员的强制手段是躁狂症患者的攻击行为的危险因素。结论:及早对躁狂症攻击行为患者实施心理干预及健康指导,可以将攻击行为减少到最低限度。

We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.

本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。

The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.

该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。

Honeypots are a well known technique for discovering the tools, tactics, and motives of attackers.

密罐是一种用来发现攻击工具,攻击策略与攻击者攻击动机的知名技术。

Where contact is deemed by the referee to be too strong, but does not diminish the competitor's chances of winning, a warning may be given. A second contact under the same circumstances will be penalised by KEIKOKU and IPPON, given to the opponent. A third offence will be given HANSOKU CHUI and NIHON, to the injured competitor. A further offence will result in disqualification by HANSOKU.

如果裁判认为接触太重,但并不影响被攻击选手获胜的机会,攻击者将被判处口头警告﹝忠告〝CHUKOKU〞﹞,同样的情况下第二次触击,攻击者将被判处警告﹝KEIKOKU﹞,被攻击者获得一胜〝IPPON〞﹝一分﹞,第三次犯规者将被判处犯规注意,被攻击者获得二胜〝NIHON〞,第四次犯规者将被判处犯规而失去资格。

Secondly, the pseudo-chaotic stream cipher based on searching plaintext in a pseudo-random symbolic sequence is analyzed, by several successful cryptanalytic attacks such as one-time pad attacks, bifurcation diagram attacks, entropy attacks, differential attacks and key recovery attacks etc..

第二章研究了基于搜索机制的数字混沌序列密码算法,并详细分析了包括一次一密攻击,分叉图攻击,熵攻击,差分攻击以及基于符号动力学的攻击方法。

第72/100页 首页 < ... 68 69 70 71 72 73 74 75 76 ... > 尾页
推荐网络例句

Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).

呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。

The cost of moving grain food products was unchanged from May, but year over year are up 8%.

粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。

However, to get a true quote, you will need to provide detailed personal and financial information.

然而,要让一个真正的引用,你需要提供详细的个人和财务信息。