您要查找的是不是:
- Defenses in terms of attack detection algorithms are categorized under section “Attack detection algorithms”. 在“攻击检测算法”一节中在攻击检测算法方面对防御系统进行分类。
- We identify the characteristics in attack detection algorithms and attack responses by reviewing defenses that have appeared in the literature. 我们通过评论出现在文献中的防御来鉴别攻击检测算法和攻击响应的特点。
- The influence of wormhole attack on the node's number of neighbors is analyzed,and a logic topology based method is proposed for attack detection. 分析了虫孔攻击对于网络节点邻居数目的影响,提出了一种基于网络逻辑拓扑的攻击检测方法。
- In the end, the paper expects the future of research on AIRS by discussing the prospect of using composite attack detection and attack prediction techniques in response decision. 论文最后对未来自动入侵响应系统的研究进行了展望,指出了将复合攻击识别和攻击预测应用在响应决策中的意义。
- Communicating protocols refer to the protocols used to send control messages between various nodes of a network to coordinate attack detection or attack responses. 通信协议指出用来在一个网络的不同节点间发送控制消息以调整攻击检测或攻击响应的协议。
- Once the monitored network links are congested, the attack detection algorithm identifies the type of network flows/connections that contribute to the congestion. 一旦受监控的网络连接被拥塞,攻击检测算法鉴别导致拥塞的网络流/连接的类型。
- The model can make up for some of the methods of attack detection difficult in traditional DIDS, thereby increasing the Intrusion Detection rates of IDS. 该模型可以弥补传统分布式入侵检测系统难以检测的一些攻击手法,从而提高了IDS的入侵检测率。
- Attack detection algorithms identify attack traffic from the network traffic monitored and attack responses act against attack traffic by triggering filtering. 攻击检测算法从监控的网络流量中鉴别攻击流量,攻击响应通过触发过滤阻止攻击流量。
- Utilizing features of grey theory that less data is needed in model construction,and method that each node undertakes detection tasks,this model will save energy consumed in attack detection. 该模型利用灰理论建模所需数据较少的特点,结合各节点分担检测任务的方法,可节约检测攻击行为所需耗能。
- Destroyers: These give a hefty gun attack detection bonus, along with substantial morale and organization bonuses. They also give a slight advantage in gin attack, speed, and torpedo attack. 驱逐舰:给与有力的炮火支持,并士气和组织度的奖励。
- In the case of protecting against DDOS attacks, an attack detection algorithm identifies the characteristics of the traffic flow that will be policed. 在防止DDOS攻击的情况下,一个攻击检测算法鉴别会被管制的流量的特性。
- Network-based anomaly dectection systems have advantages such as early detecting and novel attack detecting. 其中,基于网络的异常检测具有能发现新攻击、能及早做出响应等优势。
- Denial of Services Attack Detection 拒绝服务攻击检测
- The article is a savage attack on her past action. 那篇文章对她过去的行为进行了恶毒的攻击。
- One squadron peeled off to attack enemy bombers. 一中队战机脱离编队攻击敌轰炸机群。
- She had an attack of indigestion yesterday. 她昨天消化不良。
- The commander chalked out his plan of attack. 司令官对进攻计划作了粗略的介绍。
- The attack on Pearl Harbor was a crushing calamity. 偷袭珍珠港(对美军来说)是一场毁灭性的灾难。
- The attack would bog down sooner or later. 进攻迟早会陷入停滞状态。
- An attack of fever carried Gary off. 加里突然患了一种热病,不幸死亡。