排序方式: 共有7条查询结果,搜索用时 0 毫秒
1
1.
扫描器原理与反扫描措施 总被引:3,自引:0,他引:3
李素科 《网络安全技术与应用》2001,(3):32-34
扫描是黑客攻击的必备步骤,它常常被用来收集网络或系统信息.在互联网上随处都可以得到各种扫描工具.本文对一般扫描器(scannen)原理、扫描方法以及相应的防范策略进行了介绍. 相似文献
2.
Web 2.0 technology leads Web users to publish a large number of consumer reviews about products and services on various websites.Major product features extracted from consumer reviews may let product providers find what features are mostly cared by consumers,and also may help potential consumers to make purchasing decisions.In this work,we propose a linear regression with rules-based approach to ranking product features according to their importance.Empirical experiments show our approach is effective and promising.We also demonstrate two applications using our proposed approach.The first application decomposes overall ratings of products into product feature ratings.And the second application seeks to generate consumer surveys automatically. 相似文献
3.
4.
IPSec的目的是在不改变网络应用的前提下,解决网络基础设施中存在的安全问题,它允许将安全策略嵌入网络层,为网络应用提供保护.本文介绍了IPSec的体系结构和组件、身份验证和保密性机制、验证头(AH)和封装安全载荷(ESP)的运作以及Internet密钥交换(IKE). 相似文献
5.
本文简单分析了利用LKMs的特性进行入侵的方法,并示例性的给出了一个在Linux2.2.15下可以很好运行的简单的发现隐藏LKMs的程序.这个程序,可以是一个基于主机的IDS(入侵检测)系统一个子程序. 相似文献
6.
7.
1