1) Attack Scenario
攻击方案
1.
Research on Attack Scenario Generation Technology for Attack Resistance Test;
抗攻击测试攻击方案生成技术研究
2) database of attacking project
攻击方案数据库
3) attack case
攻击案例
1.
Study on a comprehensive attack case learning system;
攻击案例综合学习系统研究
4) attacking mode
攻击方式
1.
The composition, function, attacking modes and working procedure of the designed FCS for air-lunched cruise missiles are analyzed in the paper.
空射巡航导弹武器系统所涉及的关键技术很多,本文针对空中平台发射的巡航导弹的特点对火控系统总体设计进行了探讨;对空射巡航导弹火控系统的组成、功能、攻击方式、工作过程等进行了分析。
2.
The different attacking modes and targeting methods used for various air to air, ait to ground, guided and nonguided weapon are summarized in the paper.
介绍了空空、空地、制导与非制导武器所使用的各种攻击方式及瞄准方
5) attack method
攻击方法
1.
In this paper, the classification and their vulnerabilities of wireless sensor network routing protocol are presented, and the attack methods for several network routing protocols are analyzed, and the security strategy of network routing protocol is elaborated.
介绍了无线传感器网络路由协议分类及其脆弱性,分析了几种网络路由协议的攻击方法,阐述了网络路由协议的安全策略。
2.
Various attack methods are fully analyzed and summarized,and some relevant remedies against part of those attacks are put forward,which are of great importance to im.
全面总结和分析了现有的各种数字水印的攻击方法,并对部分攻击方法提出了相应的解决对策,对改进和设计新型的水印算法具有重要指导作用;最后,对数字水印技术未来的研究方向作出了展望。
3.
Three important research directions in computers cryptology are encryption, secret key security and attack method (cryptanalysis).
加密方法、密钥安全性、攻击方法(密码分析学)一直就是计算机密码学研究的三个方面,混沌作为一种新的密码编码源,正引起信息安全领域愈来愈多的关注,本文综述并分析了混沌在保密通讯研究中的这三个重要方面。
6) attacking methods
攻击方法
1.
Current attacking methods to digital image watermarking and basic countermeasures;
常用数字图像水印攻击方法及基本对策
2.
embedding techniques and attacking methods.
该文较为系统地分析了当前关于数字图像水印的常用攻击方法,讨论了数字水印技术未来可能出现的研究热点。
3.
At first,researching the state conversion of system intrusion,analyzing some famous attacking methods,such as TCP SYN FLOODING,IP FRAGMENT OVERLAP and so on,according to defect of the existing intrusion detection technology,a new intrusion detection model is accomplished,intrusion detection technology based on characteristic information sequence parsing is proposed.
对系统入侵的状态转换进行了研究,分析了常见的黑客攻击方法,包括TCPSYNFLOODING、IP分片攻击等。
补充资料:《眉寿堂方案选存》
《眉寿堂方案选存》 《眉寿堂方案选存》 医案著作。二卷。清·叶桂撰,郭维浚编。原系抄本,后收入《中国医学大成》中。上卷包括春温、时疠、暑、燥、寒、冬温、疟疾等各类时症;下卷记述妇、儿、痘疹、外科。每类病证之医案均重点介绍辨证立法及处方,辨析疑似之证,掌握各类疾病治法。其中妇科治案记述尤详。现存《中国医学大成》本。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条