1) eavesdropping
[英]['i:vz,drɔpiŋ] [美]['ivz,drɑpɪŋ]
窃听、窃取
2) eavesdropping
[英]['i:vz,drɔpiŋ] [美]['ivz,drɑpɪŋ]
窃听
1.
Random network coding against the eavesdropping adversaries
一种防窃听的随机网络编码
2.
This paper analyses of the submarine optical fible cable signals eavesdropping technology channels,discussed the waters of China′s submarine fiber optic cable for wiretap method,the United States nuclearpowered attack submarines" Jimmy·Carter,"the eavesdropping undersea fiber optic cable capacity.
分析了对海底光缆中的光信号进行窃听的技术途径,讨论对我国海域海光缆进行窃听的方法,研究了美国核动力攻击潜艇"吉米。
3) tapping
[英][tæp] [美][tæp]
窃听
1.
Based on optical fiber-bending radiation,four steps method for optical cable tapping,bending the optical fiber,collecting optical signals and demodulating information are proposed.
基于光纤弯曲辐射,提出了四步光缆窃听法,即"剥光缆,弯光纤,取信号,解信息"。
2.
By analyzing Four Wave Mixing (FWM) theory, we propose a new tapping and attacking method by virtue of ROADM.
在分析四波混频理论的基础上,提出了借助可重构光分插复用器、基于四波混频效应实施光信道窃听和攻击的方法;仿真了对光信道窃听的可行性,并进行了攻击试验,这种攻击可导致通信系统服务质量明显下降,甚至出现服务拒绝。
3.
In order to collect the information about the terrorism,the American government approved the" Patriot Act" and thus enlarged swiftly the power of the government for tapping and wiretap surveillance,which has been doubted by the public,but in the subsequent years,the American government still takes a series of measures to strengthen the surveillance procedure.
为了加强对恐怖主义的情报收集,美国政府通过《爱国者法》迅速扩大政府窃听及电讯监视的权力。
4) eavesdrop
[英]['i:vzdrɔp] [美]['ivz'drɑp]
窃听
1.
The works are as follows:1、Proposed a framework for security analysis, pointed out the parameters which related to security in address codes, analysed the securiyt performance from the perspective of two common eavesdropping methods, deduced the time eavesdropper required when taped single-signals from multiple users and the ability to tap a single user and multiple users.
完成的主要工作如下:(1)介绍了OCDMA安全性能分析的模型,指出了地址码中和安全性有关的几个参数,从两种常见窃听方式的角度定量分析了安全性能,推导出了窃听者从多个用户信号中窃听到单用户信号所需的时间,以及窃听单个用户和多个用户的能力。
5) wiretap
[英]['waiə,tæp] [美]['waɪr,tæp]
窃听
1.
Then it analyzes the wiretap and RTP injection attack.
文中介绍了基于SIP的VoIP系统中有关RTP的攻击,通过协议与报文分析,深入分析并实现了窃听攻击与RTP注入攻击,证明了这两种协议存在安全漏洞,最后提出了防范这些攻击的方案,为提高VoIP系统的安全性提供了参考。
6) interception
[英][,intə'sepʃən] [美][,ɪntɚ'sɛpʃən]
窃听
1.
It solves the security problems of interception, interference, forgery and replay, which endanger the messages delivered among computers in a cluster.
它解决了在构成集群的各个计算机之间传递消息所面临的被窃听、篡改、伪造和重放的安全性问题,独立于具体的下层网络协议,消耗系统资源少,并且具有可动态配置的优点。
补充资料:窃听
窃听
bugging
qieting窃听(bugging)使川技术器材秘密听录敌人谈话、声响的活动。技术侦察的 种。通常山司令部组织专业使察人贝实施。窃听分微舒窃听、有线电窃听、无线电窃听、全l:外线窃听和激光窃听等。微合窃听,是川微扦器l气接拾取·定趴离卜的)“行信号。有线电窃听,是将拾台器隐蔽或伪装放锐I-.窃听对象附近.拾取声音信号少l“经放人等技术处理后,通过线路接收。无线电窃听,是将拾取的声音信号进行调制,川电磁波发射到空间,在定趴离1:进行接收。1:述几种窃听方式,技术成熟,易J几伪装,使川方便,下吐易被侦测破获。红外线窃听,是川拾取到的声音f占号调制成红外线光源,在接收端再行解调。激光窃听,是把激光束照射到窃听对象的房间玻璃L,接收被声行调制r的反射波束,从中解调}!}声粉f.乍号。这两种窃听方式的突出优点是不易被侦破,了l1.窃听即离近,在传输路径1几不能有遮蔽物。窃听只有组织实施简便.所获情报真实、可靠、时效性强等特点。组织实施的要求蒸 无线电窃听是:根据赋予的任务和窃听器材的性能、特点,合理选川窃听方式,址人限度地发挥窃听器材的效能二因地制‘l’l:地选择窃听阵地,做好阵地、器材、人员的伪装,使之既能保障各种窃听设备的正常I二作,又有良好的隐蔽条件。 (祁文杰)
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条