Attack Tree 攻击树 ; 攻击树模型
attack tree model 攻击树模型
minimal attack tree 最小攻击树
Attack Tree Cutting 攻击树裁剪
enhanced attack tree 增强攻击树
Attack tree prunning 攻击剪枝
the model of attack-tree 攻击树模型
Previous works mainly focus on using attack tree to modeling specific attack events. In this paper,attack tree is used to model the attacks from a system"s perspective.
但总的来说,现有的研究都着重于针时具体的攻击事件进行建模,在利用攻击树进行分析时缺乏系统性和整体性,难以对攻击树进行有效的利用。
参考来源 - 期刊学术社区·2,447,543篇论文数据,部分数据来源于NoteExpress
以上来源于: WordNet
Carrying the detection on worm attack out by the attack-tree model.
利用攻击树模型对蠕虫攻击进行检测。
Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
应用推荐