| 1. | Lifting the covers : analyzing selected network attacks 攻击揭密:分析选定的网络攻击 |
| 2. | The current situation of network attack and defense resistance 网络对抗的现状及防御抵抗 |
| 3. | Application of network cybernetics in network attack and defense 网络控制论在网络攻防中的应用 |
| 4. | Design and realization of network attack intelligent decision support system 基于数据仓库的决策支持系统 |
| 5. | Application of fuzzy - ahp method in the effect evaluation of network attack 法在网络攻击效果评估中的应用 |
| 6. | Analyzing selected network attacks 分析选定的网络攻击 |
| 7. | Analysis and realization of network attack of overflow vulnerability 下溢出漏洞扫描技术的网络渗透分析与实现 |
| 8. | Formulization of network attack pattern based on improved attack tree 基于改进攻击树的网络攻击模式形式化研究 |
| 9. | ( 2 ) do an in - depth research on network attack technology based trojan horse ( 2 )深入研究了基于木马的网络攻击技术。 |
| 10. | The analysis of network attacks based on registry and the relevant safe solutions 基于注册表的网络攻击分析及相应解决方案 |