攻擊手段 的英文怎麼說

中文拼音 [gōngshǒuduàn]
攻擊手段 英文
snarf attack
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 (人體上肢前端能拿東西的部分) hand 2 (擅長某種技能的人或做某種事的人) a person doing or...
  • : Ⅰ量詞(部分) section; segment; part; paragraph; passage Ⅱ名詞(姓氏) a surname
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The quadratic equation algorithm utilizes spa, dpa and principle of rsa - crt, converts the complicated prime factorization of a large composite number into finding the solution of a quadratic equation and gains the private key at last

    該方法綜合利用spa 、 dpa攻擊手段和rsa - crt演算法原理,將rsa演算法的大數分解難題轉化為以私鑰p或q為解的二次方程,最終獲取演算法私鑰值。
  2. At the begin of the dissertation, we has discussed the state of security on internet, analyzed the factors caused frangibility of internet, and intrude some means used to provide security services for internet

    本文從網路安全的現狀談起,探討了網路安全的主要威脅因素和相應的攻擊手段,同時也歸納了針對這些威脅因素和攻擊手段而採取的提高網路安全的安全措施和技術
  3. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測和服務器端假冒的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。
  4. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。
  5. Means of watermark attack and test result evaluation are two important components

    水印攻擊手段和測試結果評價是建立水印測試基準的兩個重要組成部分。
  6. Type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic

    典型的網路攻擊手段,通過灌注大量無用的信息使得網路癱瘓。
  7. It summarize the algorithm model and attack means of the watermark and generalized the existing picture watermark algorithm

    本文首先對水印技術進行了概括性介紹,總結了水印演算法模型和攻擊手段,概括了現有的圖像水印演算法。
  8. Network security has become government 、 research 、 and company focus. the upgrading network attack meanings cause much destroyes and make much more loss

    網路攻擊手段的不斷升級,其破壞性也越來越大,造成的損失也就越來越多。
  9. On the research of corresponding countermeasures, by analyzing and discussing the vulnerabilities to spa, dpa for rsa and rsa - crt, the improved algorithms and

    在能量分析的防禦研究中,針對攻擊手段分別給出防禦措施和改進演算法。
  10. On the other side, these methods and tools can be used to test function and quality performance of the security product such as firewall and ids

    另一方面,也可以利用這些攻擊手段和工具作為防火墻和ids等安全產品的功能和性能測試的測試和性能指標的依據。
  11. Among the network attack meanings, denial of service ( dos ) is one of important network attack, it mainly uses the bug of network protocol

    在這些網路中,拒絕服務( denialofservice , dos )作為一種重要的網路攻擊手段,該主要利用了網路協議的缺陷。
  12. In the research counterplan of hacker ' s attack, i carefully analyse the whole process of attack, so i study out the countermeasure

    在研究黑客的安全性問題時,以一個黑客監控網路的全過程仔細分析研究了黑客攻擊手段,這樣就研究出具有針對性的防禦對策。
  13. Last, i give some examples on how to write exploit programs after finding vulnerabilities. i also introduce a new exploit method : exploit based on software signal

    最後就如何編寫通用的緩沖區溢出代碼進行了分析和舉例,還介紹了一種新的攻擊手段,基於信號量的
  14. With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security

    隨著網路攻擊手段的日益復雜化、多樣化和自動化,傳統的入侵檢測系統( ids )已不能滿足安全需求。
  15. This course is intended to provide some specifics concepts such as the methodology of hacking, incident handling, encryption, physical security, database security, e - commerce security

    這個課程的目標是為學員提供一些深入的概念:如黑客攻擊手段、安全事件的處理響應、加密技術、物理安全、數據庫安全、電子商務安全等。
  16. And the analysis also illuminates the structure and machinism of bt net. according to that, the weekness and leak of bt are exposed. after knowing how to download files and how to connect a client of bt, the ways of attack bt net are brought forward

    在通過對客戶端文件下載和連接機制的研究和分析后,本文提出了針對bt網路的方式和攻擊手段,並通過實驗實際證明了這些可能會給網路和用戶帶來的後果和影響。
  17. The paper introduces the definition of worm according to the history of worm, analyses the worm ’ s function module, attacking mode, scanning regulation and the typical worm - sasser, then brings forward a worm - detecting algorithm based on packet statistics, by analyzing the detecting algorithm in existence

    本文結合蠕蟲發展的歷史提出了蠕蟲的定義,分析了蠕蟲的功能結構,攻擊手段,掃描策略,並對sasser蠕蟲進行了剖析。簡述了現有的蠕蟲檢測演算法,並分析了其優缺點,提出了基於數據包統計的蠕蟲檢測演算法。
  18. Only with the deep understanding of the knowledge on the typical attack methords and theories, we can take some more effective and more specific defending measures, and decrease the loss to the lowest level

    只有對各種攻擊手段原理有了深入認識,才能採取更有效、更有針對性的防範措施,從而把損失降低到最小程度。
  19. This paper introduces the typical attack methords and theories in internet, and discusses the security features and defending measures of intranet according the real state of dalian diesel group ' s intranet. based on this, the technology of firewall, anti - virus and intrusion detection is especially analysed

    本文詳細介紹了因特網上目前常見的各種攻擊手段原理,並結合大連柴油機廠內部網路的實際情況對intranet的安全特性和防範措施進行了一定探討,其中重點分析了防火墻技術、防病毒技術和入侵檢測技術。
  20. " although an attack using conventional explosives continues to be the most probable scenario, al - qaida remains interested in acquiring chemical, biological, radiological, and nuclear materials or weapons.

    雖然攻擊手段中使用傳統的爆炸物是最可能的設想,但是基地組織依舊有興趣來獲得生化,放射性和核材料或者武器。
分享友人