助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   提取攻击 的翻译结果: 查询用时:0.01秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

提取攻击
相关语句
  extracting attack
     Extracting Attack to Sequential JSTEG Stegosystems
     对JSTEG隐写系统的提取攻击
短句来源
     The present paper point out that extracting attack, which is essentially a special kind of cryptanalysis, belongs to the crossed field of cryptanalysis and steganalysis, and can be realized by combining the thoughts and techniques of the two fields. Based on this point of view, we did groping research on the theory and methods of extracting attack, and got the following results.
     本文提出对隐写术的“提取攻击”本质上是一种特殊的密码分析,它属于密码分析与隐写分析的交叉领域,需要结合二者的技术来实现,并基于此思路对“提取攻击”作了理论与方法上的探索性研究,主要完成了以下几方面的工作:
短句来源
     In fact, extracting attack can be treated as a special kind of cryptanalysis, and we solve this problem by using both traditional steganalysis and traditional cryptanalysis.
     本文首次将密码分析的思想引入隐写分析,将提取攻击看作是一种特殊的密码分析。 结合传统隐写分析和密码分析知识,讨论了对于JPEG图像随机的LSB隐写系统的提取攻击
短句来源
     The"extracting attack" on steganography is a kind of steganalysis, the purpose of which is to extract the hidden message.
     对于隐写术的提取攻击是一种隐写分析,其目的是将隐藏消息提取出来。
     In fact, extracting attack can be treated as a special kind of cryptanalysis. Spearman correlation coefficient and the correlation attack of cryptanalysis can be used to extracting the hiding message of LSB JPEG steg-anographic schemes.
     提取攻击可以看成是一种特殊的密码分析,利用Speareman相关系数借鉴密码分析中相关攻击的方法,对当前常用的JPEG 图象LSB隐写算法给出了一种有效的提取攻击方法。
  “提取攻击”译为未确定词的双语例句
     Using the basic knowledge of cryptology and statistics, and with the traditional steganalysis method, we discuss how to extract the hiding message which is embedded by LSB steganography of JPEG images.
     本文综合利用密码学、统计学的基本知识,结合传统隐写分析的方法,对一类具体的隐写算法——JPEG图像LSB隐写算法进行了唯载密图象的提取攻击
短句来源
     The approach aims at some steganographic algorithms of spatial LSB insertion in the conditions of cover-object used repeatedly.
     首先,本文在载体被重复使用的条件下,对图像空域LSB替换的隐写算法进行提取攻击
短句来源
     Results of experiment to "hide and seek" are provided to prove that stego key can be found effectively.
     针对"hide and seek"的提取攻击试验结果表明,该方法可有效地恢复隐写密钥。
短句来源
     The intrusion detection system based on characteristic has very high false alarm rate or miss alarm rate, and they also have many other disadvantages such as failing to detect unknown attack, abaining attack patterns manualy and so on.
     基于特征检测的入侵检测系统不仅误报率和漏报率居高不下,而且还存在着不能检测未知攻击和必须手工提取攻击模式等弊病。
短句来源
     According to characteristics of DDoS attacks, we introduce a practical scheme to defend against DDoS attacks which implements in two phases.
     针对DDoS攻击的特点,提出了一种分阶段的防御模型,即第一阶段根据历史IP过滤(HIF),第二阶段提取攻击包特征规则,根据该规则进行进一步的过滤。
短句来源
更多       
  相似匹配句对
     S. tenebrarius H6 total DNA was extracted and incomplete digested with Sau3A I .
     提取S.
短句来源
     Extracting Attack to Sequential JSTEG Stegosystems
     对JSTEG隐写系统的提取攻击
短句来源
     Extraction the Ricin from the Castor Dregs
     蓖麻毒蛋白提取
短句来源
     difficile.
     difficile攻击
短句来源
     necatrix, which showed anamnestic response to reinfection with E.
     necatrix的攻击
短句来源
查询“提取攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      


Indirect attack is one of the important means used by network attackers to conceal themselves. This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment. The sensors distributed in network detect attacks, gather attack fingerprint and then send alarm information to the central analyzer, which correlates alarm information and constructs attack path to decide the intruder's origin network address. Compared...

Indirect attack is one of the important means used by network attackers to conceal themselves. This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment. The sensors distributed in network detect attacks, gather attack fingerprint and then send alarm information to the central analyzer, which correlates alarm information and constructs attack path to decide the intruder's origin network address. Compared with the other systems available, this system is more accurate, scalable and can trace back intruder's address in real time.

提出并实现了一个基于网络入侵检测的入侵者定位系统.该系统利用分布在网络内的多个网络检测器检测网络攻击,并提取攻击指纹信息,由中央分析器对指纹信息进行相关性分析,构造攻击路径,从而得到入侵者的网络地址.和已有各种方法相比,该系统有更好的准确性、可扩展性和实时性,可有效地解决可控网络环境下的间接攻击问题.

An active steganalysis approach aiming at some steganographic algorithms of spatial LSB insertion is presented in this paper.This approach based on cryptanalysis works in the circumstance of a cover image used repeatly.Results of experiment to "hide and seek" are provided to prove that stego key can be found effectively.

该文针对图像空域LSB替换的隐写算法,在载体被重复使用的条件下,运用密码学思想对载体进行提取攻击,给出了一种主动隐写分析方法。针对“hideandseek”的提取试验结果表明,该方法可有效地恢复隐写密钥。

In view of the demand that distributed attack detection needs massive data, this paper puts forward a cooperative detection model based on component structure. This model encapsulates the fine-grained components such as clusters and classifiers, and results in the features of detecting distributed intrusions, accelerating the speed of data analysis and processing, and improving the system scalability.

本文针对检测分布式入侵时海量数据分析的应用需求,提出一种基于组件结构的协同检测模型。该模型将用于海量数据分析的相关组件独立出来封装成一个组件事务服务层,通过聚类分析器、分类分析器等多个细粒度组件并行对海量数据进行压缩与分类,提取攻击特征值,从而不仅可以检测分布式入侵,而且加快了数据分析与处理速度,提高了系统的可伸缩性。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关提取攻击的内容
在知识搜索中查有关提取攻击的内容
在数字搜索中查有关提取攻击的内容
在概念知识元中查有关提取攻击的内容
在学术趋势中查有关提取攻击的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社