| 1. | Attack pattern delta . go now 启动d号攻击模式现在! |
| 2. | Formulization of network attack pattern based on improved attack tree 基于改进攻击树的网络攻击模式形式化研究 |
| 3. | Attack pattern shinzon theta 执行八号进攻方案 |
| 4. | Known attack patterns are defined into temporal scenario models to process online or offline alert flow 该算法将已知的攻击模式定义成时间场景模型来处理在线或离线的报警流。 |
| 5. | Usually most practical intrusion detection systems ( idss ) in existence only compare the audit data with the attack pattern database , and find the actions in collision with security strategy 现有的大多数实用入侵检测系统通常只是将收集到的审计数据与已有的攻击模式数据库进行简单的比较,从而发现违背安全策略的行为。 |
| 6. | Through the analysis and conclude the attack pattern , three main goals is put forward by writer and the function of the product is depicted and analyzed , so as the characteristic of the user and restriction conditions . 3 . implement all parts of the honeypot system 作者通过对网络攻击的分析与归纳提出了蜜罐系统的3个主要作用,围绕着蜜罐系统的3个作用和项目的相关要求,对蜜罐系统产品及其功能作出了描述,分析了其具体功能、用户特点和系统的约束条件等因素。 |