助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   攻击方法 在 互联网技术 分类中 的翻译结果: 查询用时:0.047秒
图标索引 在分类学科中查询
所有学科
互联网技术
电信技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

攻击方法     
相关语句
  attack method
    Precaution and Analysis on Network Attack Method Based on TCP/IP Agreement
    基于TCP/IP协议的网络攻击方法剖析及预防措施
短句来源
    A New Attack Method for Watermark Systems
    针对数字水印系统的一种新型攻击方法
短句来源
    The principle of the hacker's new attack method, Distributed Denial-of-Service (DDoS). is analyzed in this paper, and the fact that some security problems of TCP/IP protocol are utilized by DDoS is also discussed.
    本文分析了网络黑客的新型攻击方法——分布式服务拒绝(DDoS)——的原理,指出DDoS攻击主要利用了TCP/IP协议的一些安全漏洞.
短句来源
    Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
    第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
短句来源
    In the face of threatenning, numerous safe organizations and companies research and develop a lot of safe products, but the new attack method is appearing constantly, the update of the safe products can not catch up with the appearance of the question all the time, often after a certain attack has caused enormous losses , just take the remedy .
    面对威胁,众多安全机构和公司研发了许多安全产品,但新的攻击方法不断出现,安全产品的更新换代始终跟不上新问题的出现,往往在某个攻击造成了巨大损失后,才采取补救措施。
短句来源
更多       
  attack methods
    The Analysis of Typical Fragility and Common Attack Methods of TCP/IP Protocol
    典型的TCP/IP协议脆弱性及常见攻击方法分析
短句来源
    The Comparison of Five IP Traceback Denial-of-Service Attack Methods
    五种IP返回跟踪拒绝服务攻击方法的比较
短句来源
    Three Attack Methods to AODV and Corresponding Solutions
    对AODV路由协议的三种攻击方法及相应的解决方案
短句来源
    Web Attack Methods and It's Security Studying
    Web攻击方法及其安全研究
短句来源
    An Applied Research of AHP in IP Traceback Denial-of-Service Attack Methods
    层次分析法在IP返回跟踪DoS攻击方法中的应用研究
短句来源
更多       
  attacking methods
    A new attacking principle is given to the newest typical MP3 embedding software MP3Stego V1 1 16 The principle is to make the embedded data invalid and keep the quality of original MP3 and its statistic distribution unaffected Any information cannot be extracted from attacked MP3 Three attacking methods are presented to attack the MP3Stego V1 1 16 The experiment results demonstrate their validity
    针对普遍使用的MP3水印嵌入的最新软件MP3Stego1 1 16版 ,提出一种攻击思想 :在不降低隐蔽音频质量、不改变其统计分布规律的条件下 ,使嵌入在音频上的隐藏数据失效 ,从而无法正确提取水印 根据这种思想 ,结合MP3Stego1 1 16软件 ,提出三种直接有效的攻击方法 ,并进行了听觉、统计分布、信噪比和相关性等的检验
短句来源
    However, merely detection can not meet the security requirement with the variety of hackers' attacking methods, response together with control after detection of intrusions becomes important approach of restricting hackers and protecting network in time.
    然而,随着黑客攻击方法的日益多样,单纯的检测已经不能适应安全的要求,发现入侵以后的响应与控制成为制约黑客攻击,实时保护网络的重要手段。
短句来源
    In fact, a lot of network attacks are to abuse different network protocols and several new attacking methods violate the protocol standard.
    事实上,大量的网络攻击都是对不同的网络协议进行滥用,很多新型的攻击方法都违背了协议标准。
短句来源
    This paper introduces the working principle of Distributed Denial of Service and its attacking methods,particularizes the detective methods and counter plan to it.
    分布式拒绝服务攻击是近来在网络上被反复运用的一种网络攻击方法 ,危害很大 ,目前还没有很好的阻止和防御此类攻击的方法 ,本文提出了一些针对分布式攻击的检测方法和应对策略。
短句来源
    The flaw of security in the file protocal service and three common attacking methods are described, for which, the corresponding solution is presented in this paper, where an FTP service is designed that has digital authentication, authorization and DSS,and can be easily implemented as well.
    阐述了FTP服务器服务的安全缺陷,介绍了三种著名FTP服务攻击方法,提出了解决措施,并设计了一种较易实现的结合数字授权、数字验证、数字签名机制的FTP服务系统.
短句来源
更多       
  attack means
    Today windows operation system has the max users in the world, and there are more and more attack means to the windows operation system.
    在windows操作系统拥有全球最多用户的今天,针对Windows攻击方法也越来越多。
短句来源
    Based on an introduction of main content-based spam filtering technologies,the main attack means that the spammers use to attack content-based spam filters is analyzed,and the corresponding filtering improvement technologies are put forward.
    在介绍主要基于内容的垃圾邮件过滤技术基础上,分析了针对基于内容垃圾邮件过滤器的常用攻击方法,并提出了相应的过滤改进技术。
短句来源

 

查询“攻击方法”译词为其他词的双语例句

 

查询“攻击方法”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  attack method
Due to the attack method employed by this parasite, the presence of more than one female in the nest did not result in improved nest defense.
      
Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine.
      
Buffer overflow attack is arguably the most widely used and thus most dangerous attack method used today.
      
One attack method seeks to cause the target to use more resources processing traffic than the attacker does sending the traffic.
      
On the other hand they will be effective against exploitation of any new bugs using the same attack method.
      
更多          
  attack methods
In this paper, we propose wavelet-based denoising attack methods on image watermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain or discrete wavelet transform (DWT) domain.
      
Again, three different attack methods are used, which proved devastating in a more homogenous Internet.
      
Another disadvantage is that minor variations in attack methods can often defeat such systems.
      
Also minor variations in attack methods can often defeat such systems.
      
Attackers may use one or more attack methods to achieve their different goals.
      
更多          
  attacking methods
For stack smashing attacks, the most common attacking methods, our goal is to completely defend against such attacks.
      
These two schemes are merely selected as specific examples to describe our attacking methods.
      
The geometric transform and the lossy compression is major attacking methods to image watermarking.
      
  其他


A Several methods of fast correcation attacks areanalyzed in this paper. Their disadvantages/advantages are discussed.Two improving methods of fast correlation attacks are presented in thefinal parties of the paper.

本文分析了几种快速相关攻击方法,讨论了它们的优缺点,最后提出了两个改进的快速相关攻击方法

Matsumoto presented protocols to speed up secret computations with insecure auxiliary devices.The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder.It was stated that if RSA is secure,the protocols only be broken by exhaustive search in certain spaces.In this paper,we give an attack which shows that much smaller search spaces suffice.We also discuss parameter selection for these protocols.

Matsumoto等提出了两个利用不安全服务器辅助的方法加速秘密计算的协议,这两个重要协议使得智能卡在卡持有者不必相信的服务器的帮助下,更快地进行秘密RSA计算,从而使得RSA签名可由一个智能卡来完成,并认为,如果RSA是安全的,则这些协议只能通过在某空间中穷尽搜索来攻击。对其中的协议一已有人给出了攻击方法,使所需的搜索空间极大减小。本文对协议二给出有效的攻击方法,减少了该协议的安全比特数,极大地减小搜索空间。为抵抗该攻击,本文还讨论了协议的参数选取。

In this paper,we use a model checker for authentication protocol,due to Marrero,Edmund,and Jha,to detect errors in the improved TMN protocol [1] .We show how to model the TMN protocol,by the MCJ mode,which is used to test if the intrude can successfully attack the protocol,and find out two kind of new flaws which were not found by the CSP method.Finally,we give an improved TMN protocol.

本文利用由Will Marrero,Edmund Clarke 及Somesh Jha 提出的认证协议的检测模型,对改进的TNM[1] 协议进行检测,给出了如何将TMN 协议模型化,并利用该模型对其进行检测,找出了用CSP 模型没能找到的两个新的攻击方法,最后给出了TMN协议的改进形式

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关攻击方法的内容
在知识搜索中查有关攻击方法的内容
在数字搜索中查有关攻击方法的内容
在概念知识元中查有关攻击方法的内容
在学术趋势中查有关攻击方法的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社