1.
An I-cache Attack Method on RSA Implementation
针对RSA密码算法的指令Cache攻击方法
2.
Simulation of Two Attacking Methods for AODV Routing Protocol;
AODV路由协议两种攻击方法仿真
3.
Source-End Network Defense Against Distributed Denial-of-Service Attacks;
源端网络防御DDoS攻击方法的研究
4.
A Study on Chaos Attacking Communication Systems;
混沌信号对通信系统攻击方法的研究
5.
Research on the Algebraic Attack on Stream Ciphers with Multi-outputs
多输出前馈模型的代数攻击方法研究
6.
Research of Power Analysis Attack Methods on Cryptographic Chip Based on FPGA
FPGA密码芯片功耗分析攻击方法研究
7.
Research on attacking method against the PXE protocol
一种针对PXE协议的网络攻击方法研究
8.
Method of Detection to Worm-Attack Based on Model of Attack-Tree;
基于攻击树模型的蠕虫攻击检测方法
9.
An Attacked-Probability-Based Approach to Ranking Attack Graph
一种基于攻击概率的攻击图分级方法
10.
The Study of Evaluation Methods of AUAV s Hit Precision in Small-Sample Circumstances;
攻击型无人机小子样攻击精度评估方法研究
11.
The Research On Automated Generation of Attack Graph Based On Attack Mode;
基于攻击模式的攻击图自动生成方法研究
12.
Forecast Algorithm for Multi-Step Attack Based on Attack Utility
基于攻击效用的复合攻击预测方法研究
13.
Research on Computer Network Attack Modeling Based on Attack Graph
基于攻击图的计算机网络攻击建模方法
14.
any pleading that attacks the legal sufficiency of the opponent's pleadings.
攻击对方申诉合法性的任何辩护。
15.
Modeling the intrusion based on the capability of attacker
基于攻击者能力状态的入侵建模方法
16.
Research on RPC Attack Detection in Windows Network;
Windows网络下的RPC攻击检测方法研究
17.
Theory、Method and Application of Multiset Attack;
Multiset攻击的原理、方法及应用
18.
Study on Defense Against a SYN-Flooding Attack;
一种针对SYN-Flooding攻击的防范方法