混合攻擊 的英文怎麼說

中文拼音 [húngōng]
混合攻擊 英文
hybrid attack
  • : 混形容詞1. (渾濁) muddy; turbid2. (糊塗; 不明事理) foolish; stupid
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 混合 : (攙雜在一起) mix; blend; mingle; admix; mixture; mix up; interfusion; commixture; blending; cre...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種型的結構,既能檢測已知的模式,又能發現新的模式。
  2. Then, based on the theory of discrete fourier transform, discrete cosine transform and discrete wavelet transform, two invisible image watermarking schemes in transform domain are proposed, one is circular symmetric spread spectrum digital image watermarking based on chaotic sequences, the other is the hybrid image watermarking based on wavelet decomposition and discrete cosine transform. finally, the good performance of the two algorithms is verified by some common image processing and attack experiments

    在分析了dft 、 dct 、 dwt的理論與演算法的基礎上,提出了兩種基於變換域的圖像隱形水印方案? ?基於沌序列的圓對稱擴頻水印方案和基於小波分解和餘弦變換結的水印方案,並通過一些常見的圖像處理及實驗驗證了這兩種演算法生成水印的性能。
  3. Abstract aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher, a new chaotic image encryption algorithm based on output ? cryptograph mixed feedback was proposed

    摘要針對現有基於沌分組密碼的圖像加密演算法中,擴散函數擴散速度慢、需要多輪迭代才能抵抗差分的缺點,提出了一種新的基於密文和輸出反饋的沌圖像加密演算法。
  4. A hybrid attack will add numbers or symbols to the filename to successfully crack a password

    混合攻擊將數字和符號添加到文件名以成功破解密碼。
  5. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square應用於rc6密碼,發現square只能少數幾輪rc6 ,這主要是因為rc6的數據依賴循環運算打亂了活動位元組和固定位元組的傳播路徑,使得無法進行。我們分析了對serpent密碼的square, serpent密碼的按比特線性運算打亂了所構造multiset的傳播路徑,使得只能進行到3輪serpent密碼。
  6. Simulation experiment results show that the haga is more effective to solve the dm problem than the aga

    模擬實驗結果表明所設計的自適應遺傳演算法比自適應遺傳演算法能更有效地解決協同多目標空戰決策問題。
  7. Certain kind of attacks on some block ciphers may be efficiently resisted by mixing the round keys with a group of frequently changed numbers computed from system time and the counter of data blocks

    摘要通過將系統時間和數據組號到輪密鑰之中,可以有效地防止一些對分組密碼演算法的
  8. Moreover, this new architecture enable ids to enhance detection capability and adaptability to intricate network environment through self - study and evolution. to achieve better accuracy, the architecture adopts security audit data gathered from both host and network. to enable ids to detect both known and unknown intrusion model, the architecture adopts a blend frame that makes use of both misuse detection approach and anomaly detection approach

    該體系結構是一種形結構:一方面,該結構同時利用基於主機和基於網路的數據源,使得ids能收集到更加全面的信息;另一方面,該結構同時使用了異常檢測技術和誤用檢測技術,既能檢測已知的模式,又能發現新的模式。
  9. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于沌密碼的文獻資料,了解目前沌密碼的研究動態和成果,研究沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  10. Circular symmetric spread spectrum digital image watermarking using chaotic sequences as the watermark takes advantage of the discrete fourier transform properties and spread - spectrum communication techniques to embed a circular symmetric watermark in the frequency domain. the watermark can be detected without the presence of the original image even when the watermarked image suffers geometrical attacks such as translation, rotation and scaling. experimental results show that the proposed scheme has good transparency and highly good robustness to geometric transformations

    基於沌序列的圓對稱擴頻水印方案是以實值沌序列作為水印,根據離散傅立葉變換的特性並結通信上的擴頻技術,將一圓對稱水印嵌入到了圖像的頻域中,且即使圖像遭受了平移、旋轉、縮放等幾何檢測水印也不需要原圖像。
分享友人