| 1. | Home computers : easy targets for cyber attacks 家庭电脑:网络攻击的易选目标吗? |
| 2. | Lifting the covers : analyzing selected network attacks 攻击揭密:分析选定的网络攻击 |
| 3. | Analyze and guard against web attack process 网络攻击过程分析与防范 |
| 4. | Application of fuzzy - ahp method in the effect evaluation of network attack 法在网络攻击效果评估中的应用 |
| 5. | Analyzing selected network attacks 分析选定的网络攻击 |
| 6. | Spectrum analysis theory ; robust of a complex network under attack 网络的谱分析理论,网络攻击鲁棒性研究。 |
| 7. | Formulization of network attack pattern based on improved attack tree 基于改进攻击树的网络攻击模式形式化研究 |
| 8. | ( 2 ) do an in - depth research on network attack technology based trojan horse ( 2 )深入研究了基于木马的网络攻击技术。 |
| 9. | Structure design research of decision support system for reservoir flood control 网络攻击智能决策支持系统的设计与实现 |
| 10. | The analysis of network attacks based on registry and the relevant safe solutions 基于注册表的网络攻击分析及相应解决方案 |