• By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.

    提取目标系统及其弱点信息攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态给出生成算法。

    youdao

  • By correlating the systems vulnerabilities and attackers behaviors, attack state graph(ASG) was introduced, and its generating algorithm presented.

    提取目标系统及其弱点信息攻击行为特征的基础上,模拟攻击者的入侵状态改变过程,生成攻击状态给出生成算法。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定