1.
Research on Computer Network Attack Modeling Based on Attack Graph
基于攻击图的计算机网络攻击建模方法
2.
Research and exploration on the generation of computer network attack graph
计算机网络攻击图的生成研究与探索
3.
Grey evaluation model and algorithm of network attack effectiveness
计算机网络攻击效果灰色评估模型和算法
4.
Investigation of Clustering attacks of computer network intrusion warning
聚类攻击的计算机网络入侵预警探讨
5.
Research on the Stuateg Against the ARP Attack Based on the Computer Network Security
基于计算机网络安全防ARP攻击的研究
6.
terrorists may @attack@ the world's computers,
网络恐怖分子可能会“攻击”全世界的计算机,
7.
Network Security Vulnerabilities Detecting and Attack Graph Constructing;
计算机网络安全漏洞检测与攻击图构建的研究
8.
Effectiveness Measurement of Information Network in the Condition of the Computer Virus Attack
计算机病毒攻击条件下的信息网络效能度量
9.
Analysis of th Defense Measures of Computer Network Security and Attack
浅析计算机的网络安全及攻击的防御措施
10.
Application of Immune Computation in Evaluation of Network Attack Strength
免疫计算在网络攻击强度评估中的应用研究
11.
Attack Mechanism and Protection Method of ARP Virus in Computer LAN
计算机局域网ARP病毒攻击机理及防护方法
12.
Research on Survivability Mechanism of Network Audit System Anti Performance-attack;
网络审计系统抗“性能攻击”可生存性机制研究
13.
A Host-Based Computing Grid Intrusion Detection Technology for U2R Attack
一种面向计算网格U2R攻击的主机入侵检测技术
14.
Click the type of network adapter that is in your computer.
单击你计算机中的网络适配器的类型.
15.
Analysis of and Protection against Lightning Strike Accident on Computer Network System;
计算机网络系统雷击事故分析与防护
16.
The Estonians say that some of the earliest salvoes came from computers linked to the Russian government.
爱沙尼亚代表说道,最初来自于计算机的网络攻击都与俄罗斯政府有关联。
17.
Incidents can include unauthorized access, malicious code (such as viruses), network probes, and denial-of-service attacks.
事件可能包括未授权访问,恶意代码(如计算机病毒),网络探测,拒绝服务攻击。
18.
A Study for the Security of Computer Network Based on Attack and Anti-attack of Radiated Virus;
基于病毒辐射攻防的计算机网络安全研究