Generating IDS Attack Pattern Automatically Based on Attack Tree

来源 :Journal of Beijing Institute of Technology(English Edition) | 被引量 : 0次 | 上传用户:sdfcasdvgase
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack t
其他文献
熟悉是因为一杯奶茶,陌生同样是因为一杯奶茶。一天的课程结束了,疲惫的身躯获得了难得的轻松的自我调节时间。拖着略显沉重的双脚。走进校门口的便利商店,无需考虑,径直走到
山西省2008年天气预报技能竞赛是在省气象台和各市气象局初赛的基础上进行的,省气象局于九月份发文要求全省在岗预报员都要参加初赛,并将初赛组织情况计入团体总分,个人日常业务
An application specific integrated circuit (ASIC) design of a 1024 points floating-point fast Fourier transform(FFT) processor is presented. It can satisfy the
The accelerating rate calorimeter was applied to study the thermal hazard of two kinds of organic peroxides, i.e. methyl ethyl ketone peroxide (MEKPO) and benzo
中共十六届六中全会把构建社会主义和谐社会作为贯穿中国特色社会主义事业全过程的长期历史任务和重大战略目标提了出来。中国共产党在妥善协调边疆多民族地区各方面利益关系
目前信息化技术得以广泛的应用,企业也加快了信息化建设工作,企业信息化是企业利用先进的信息时代管理模式进行的现代化管理,是一种以技术效率为核心的管理模式,这不仅能够更好的
Motion analyses are performed with the help of stability and simulation analysis, which can provide theoretical bases for applications of an electric vehicle wi
The process of penetrating into granite was simulated by using program LS-DYNA3D. The granite was represented by the isotropic elastic-plastic model with failur