...从RFID 系统的物理安全机制和安全协议两个方面对现有的安全与隐私问题解决方案进行讨论,最后提出了一种基于攻击树(Attack Tree)的RFID系统安全攻击模型。
基于38个网页-相关网页
attack tree model 攻击树模型
Attack-Tree 攻击树
minimal attack tree 最小攻击树
Attack Tree Cutting 攻击树裁剪
enhanced attack tree 增强攻击树
Attack tree prunning 攻击剪枝
the model of attack-tree 攻击树模型
Previous works mainly focus on using attack tree to modeling specific attack events. In this paper,attack tree is used to model the attacks from a system"s perspective.
但总的来说,现有的研究都着重于针时具体的攻击事件进行建模,在利用攻击树进行分析时缺乏系统性和整体性,难以对攻击树进行有效的利用。
参考来源 - 期刊学术社区·2,447,543篇论文数据,部分数据来源于NoteExpress
以上来源于: WordNet
Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.
深入系统地分析了攻击树模型在抗攻击测试中应用。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
This article presents attack tree model to describe the attacking scenario. Based on the principle of attack tree model, an attack specification language is constructed.
该文采用攻击树模型来模拟攻击行为,并提出了一个基于攻击树模型原理的攻击规范语言。
应用推荐