Our example exploits the JUnit and Cactus frameworks, and so we need to make these framework libraries available to our test module.
我们的示例将使用JUnit和Cactus框架,所以需要使这些框架库可用于我们的测试模块。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
Thismethod exploits the large number of don't care bits (X) in test cubes and analyzescompatible relationships among scan slices.
这种方法利用确定性测试向量中存在的大量不确定位(X位),采用对测试向量进行扫描切片划分和兼容赋值的思想。
Thismethod exploits the large number of don't care bits (X) in test cubes and analyzescompatible relationships among scan slices.
这种方法利用确定性测试向量中存在的大量不确定位(X位),采用对测试向量进行扫描切片划分和兼容赋值的思想。
应用推荐