1.
Research on Countermeasures Against Wormhole Attack in Ad Hoc Network
Ad Hoc网络虫洞攻击的防御方法研究
2.
Detecting Wormhole Attacks in Multi-path Ad Hoc Networks
检测多径路由Ad Hoc网络中的虫洞攻击
3.
Method of Detection to Worm-Attack Based on Model of Attack-Tree;
基于攻击树模型的蠕虫攻击检测方法
4.
Vulnerability Attack and Defense and Vulnerability Database Design;
漏洞攻击防范技术与漏洞数据库设计
5.
Research on Technologies of Attacks and Detections of Buffer Overflow Vulnerabilities;
缓冲区溢出漏洞攻击和检测技术研究
6.
Research on black hole attack in mobile Ad hoc networks
移动Ad hoc网络的黑洞攻击研究
7.
Hijack Linux System Call Force Out Core Dump Hole Attack
劫持Linux系统调用封杀Core Dump漏洞攻击
8.
THE MILITAI“BEE MODEL”ATTACK METHOD IN THE MODERN WAR
析现代战争民兵“蜂虫式”攻击战法
9.
Research on Finding and Detecting Attack for Large-scale DDoS & Worm;
大规模DDoS及蠕虫攻击的发现与检测
10.
Worm Detect in Basic of OSSIM’s Correlatoin Analysis Technic;
基于OSSIM关联分析技术的蠕虫攻击检测
11.
Preventing Worm Virus by Using Switch Configuration;
通过交换机设置来抑制蠕虫病毒攻击
12.
Combat Prescience. You gain a +2 insight bonus on your attack roll.
战斗远见:你的攻击掷骰得到+2洞察加值。
13.
Network Security Vulnerabilities Detecting and Attack Graph Constructing;
计算机网络安全漏洞检测与攻击图构建的研究
14.
Study on the Intrusion Detection System Aim at IPv6 Vulnerability Attack Event;
针对IPv6漏洞攻击事件的入侵检测系统的研究
15.
Research on an Attack-Graph Based Model of Vulnerability Risk Evaluation;
一种基于攻击路径的安全漏洞风险评估模型
16.
Design and Implementation of Computer Attack Training Simulator Based on Vulnerability;
基于漏洞的攻击演练模拟器的设计与实现
17.
On Attack Based on Buffer Overflow Loophole and Protection Technology;
基于缓冲区溢出漏洞的攻击及防范技术探讨
18.
A Model for Building Attack Scenarios Based on Correlation Mechanism of Intrusion Detection and Vulnerability Scanning
基于入侵检测漏洞扫描联动机制攻击场景模型