1.
Approach to Paralleling Password Cracking Intrusion andCountermeasures to Defending
口令入侵攻击的并行化及其防范对策研究
2.
Research on method of survivable requirements analysis based on intrusion attack
基于入侵攻击的生存性需求分析方法研究
3.
repel an attacker, attack, invasion
击退进攻者、 进攻、 入侵
4.
He set the dogs on the trespasser.
他唆使狗攻击侵入者。
5.
The antibodies attack and slaughter the invading microbea in the cut.
抗体能攻击和杀伤侵入伤口的微生物。
6.
Modeling the intrusion based on the capability of attacker
基于攻击者能力状态的入侵建模方法
7.
The Research on Several Pivotal Techniques of Intrusion Detection and DDoS Attack;
入侵检测若干关键技术与DDoS攻击研究
8.
Technology of Discovery and Analysis for Evidence on Network Invasion and Attack;
网络入侵与攻击线索发现和关联技术
9.
Distributed Intrusion Detection and Attack-Tracing System in Windows;
Windows分布式入侵检测与攻击源追踪系统
10.
Investigation of Clustering attacks of computer network intrusion warning
聚类攻击的计算机网络入侵预警探讨
11.
Research on scanning strategy of DDoS attack in hybrid networks
混合型网络中DDoS攻击的入侵扫描研究
12.
Discussion on DoS/DDos Attacks in Intrusion Detection System
探讨入侵检测系统中的DoS/DDos攻击方法
13.
,unprovoked aggression/attacks
无端的侵犯[攻击]
14.
An intruder has just arrived and is planning an attack.
一名入侵者刚抵达现场,正计划着一项攻击行动。
15.
The Research of Anti-attack Issues Based on Distributed Intrusion Detection;
基于分布式入侵检测的抗攻击问题研究
16.
Study on the Intrusion Detection System Aim at IPv6 Vulnerability Attack Event;
针对IPv6漏洞攻击事件的入侵检测系统的研究
17.
Research in DoS Attacks on the Base of CVE Intrusion Detection System;
基于CVE的入侵检测系统中对DoS攻击的研究
18.
A Model for Building Attack Scenarios Based on Correlation Mechanism of Intrusion Detection and Vulnerability Scanning
基于入侵检测漏洞扫描联动机制攻击场景模型