| 1. | Means of watermark attack and test result evaluation are two important components 水印攻击手段和测试结果评价是建立水印测试基准的两个重要组成部分。 |
| 2. | Type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic 典型的网络攻击手段,通过灌注大量无用的信息使得网络瘫痪。 |
| 3. | It summarize the algorithm model and attack means of the watermark and generalized the existing picture watermark algorithm 本文首先对水印技术进行了概括性介绍,总结了水印算法模型和攻击手段,概括了现有的图像水印算法。 |
| 4. | Network security has become government 、 research 、 and company focus . the upgrading network attack meanings cause much destroyes and make much more loss 网络攻击手段的不断升级,其破坏性也越来越大,造成的损失也就越来越多。 |
| 5. | On the research of corresponding countermeasures , by analyzing and discussing the vulnerabilities to spa , dpa for rsa and rsa - crt , the improved algorithms and 在能量分析的防御研究中,针对攻击手段分别给出防御措施和改进算法。 |
| 6. | On the other side , these methods and tools can be used to test function and quality performance of the security product such as firewall and ids 另一方面,也可以利用这些攻击手段和工具作为防火墙和ids等安全产品的功能和性能测试的测试手段和性能指标的依据。 |
| 7. | Among the network attack meanings , denial of service ( dos ) is one of important network attack , it mainly uses the bug of network protocol 在这些网络攻击中,拒绝服务( denialofservice , dos )攻击作为一种重要的网络攻击手段,该攻击主要利用了网络协议的缺陷。 |
| 8. | In the research counterplan of hacker ' s attack , i carefully analyse the whole process of attack , so i study out the countermeasure 在研究黑客攻击的安全性问题时,以一个黑客攻击监控网络的全过程仔细分析研究了黑客攻击手段,这样就研究出具有针对性的防御对策。 |
| 9. | Last , i give some examples on how to write exploit programs after finding vulnerabilities . i also introduce a new exploit method : exploit based on software signal 最后就如何编写通用的缓冲区溢出代码进行了分析和举例,还介绍了一种新的攻击手段,基于信号量的攻击。 |
| 10. | With the increasing sophistication , diversification and automatization of network attack tricks , traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security 随着网络攻击手段的日益复杂化、多样化和自动化,传统的入侵检测系统( ids )已不能满足安全需求。 |