推理攻擊 的英文怎麼說

中文拼音 [tuīgōng]
推理攻擊 英文
inference attack
  • : 動詞1 (向外用力使物體移動) push; shove 2 (磨或碾) turn a mill or grindstone; grind 3 (剪或削...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 推理 : [邏輯學] inference; ratiocination; illation; reasoning; ratiocinate
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. With above principles, take domestic and abroad research works as foundation, this paper try to improve the degree of integration and automatization of aircraft based on currently available technology and equipment. the study focus on how to realize auto - flight and auto - attack through the integration of flight control, fire control and propulsion control system, a satisfied result wold be feasible system integration schemas that could improve the mission performance and enhance the aircraft combat automation

    基於以上考慮,本文參考國內外已經完成的工作,致力於在現有技術基礎上提高飛機綜合化、自動化程度,研究通過飛行、進、火控等系統的綜合實現自動飛行、自動的原、演算法,提供可以工程應用的系統綜合方案。
  2. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼論技術提供魯棒的傳送和重構方法,是dos過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測和限制速率終止來自源的;基於向後倒的防禦ddos的路由機制把ddos看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于的包,通過向後倒上級路由器也得到通知而把這樣的包丟棄。
  3. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是未標定的不均衡數據集的情況,把檢測問題視為一個孤立點發現或樣本密度估計問題,採用了超球面上的one - classsvm演算法來處這類問題;針對有標定的不均衡數據集對于數目較少的那類樣本分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  4. The creation of too many qq coins, he notes, could, in theory, create a surge in china ' s total money supply, leading to inflation

    如果創造出過多q幣,他說,論上的論就是,造成中國貨幣總量的激增,有可能導致通貨膨脹。
  5. We specify a statement of failure as postcondition, expend the relative axioms and use them try to prove weakest precondition, if the proving succeed, it means that the protocol suffer from an attack

    我們定義協議的失敗條件作為後置條件,對加密系統的有關公進行擴展,並用來對最弱前置條件進行證明,如果證明成功說明該協議會受到某個
  6. This paper explores the research work on how to design a giga - bit firewall based on intel ' s network processor ixp1200, which presents both high - performance and security functionality. during the developing period, the author and his friends solved many critical problems, including multiple layer architecture, working modes, allocation of micro - engine, attack defence policies and web uuser interface. also new ideas of improvement on both future network processors and firewall products have been well presented

    本文的核心是設計和實現基於ixp1200網路處器( networkprocessor , np )的千兆硬體防火墻,在開發過程中,解決了多層體系結構、防火墻工作模式、微引擎分配、防範策略、圖形用戶界面等多方面的問題,在今後網路處器應用的廣和防火墻產品開發方面都提出了獨特的見解。
分享友人