With this increased awareness, attackers are finding it more difficult to compromise systems at the network level. 由于对这些认识得越来越清楚,攻击者发现在网络级上危害系统更加困难。
However, existing semantic clustering approaches based on the taxonomy hierarchy take little account of load balancing problem among clusters, which inevitably compromise network performance. 然而现有的基于分类层次的语义分簇方法较少考虑簇之间的负载平衡问题,这必然会影响网络的性能。
Malware is malicious code or software secretly inserted into a system to compromise the confidentiality, integrity, or availability of the data or applications residing on the network. 恶意软件是绝密地插入系统、危及网络中的数据或利用程序的保密性,全面性或可用性的恶意代码或软件。
The company also added a variety of other measures to the network infrastructure including an early-warning system for unusual activity patterns that could signal an attempt to compromise the network. 公司还对基础网络设备增添了多种其他的安全措施,例如对网络异常活动进行预警的系统。
This paper introduces the working mechanism of mobile IP and its efficiency problem in routing, as well as a compromise scheme which improves the efficiency within a local area network. 该文介绍了移动IP的工作原理、目前移动IP路由方面的问题及其改进方案。
The variety of attacks against the network can badly compromise network system, mainly due to the existence of security vulnerabilities in a computer network system itself. 各种针对网络的攻击行为之所以能对网络安全产生巨大的威胁,其主要原因在于计算机网络系统本身存在着脆弱性。
Therefore, the WiMAX network development in China should explore different avenues, position with 3G complementary non-mainstream technology and take the right amount of compromise in terms of performance and price, WiMAX network just have some competitiveness in China. 因此,WiMAX网络在中国的发展应该另辟蹊径,定位于与3G相互补充的非主流技术,在性能和价格方面采取适量的折中,方才具备一定的竞争力。
It is a compromise between the shortest forwarding path and reducing the frequency of rebuilding multicast tree, thus it achieves its goal for using network resources more effectively and enhancing service ability of network. 该算法寻求最短转发路径和减少重建组播树频率之间的平衡点,从而有效利用网络资源,增强网络服务能力。
Simulation results indicate that, compared with other node capture attack schemes, method in this paper can compromise the network by capturing fewer nodes. 仿真结果表明和其他的节点捕获攻击方案比较,本文的方案可以捕获较少的节点来达到攻击网络的目的。
The drawback of EBS is that it could not resist collusion attack. In the worst case only two collusive nodes are required to compromise all keys in the network. 但这种方法存在一个最大的问题就是无法抵御节点合谋攻击,在最差的情况下只需两个节点就可以俘获网络中全部密钥,从而导致网络沦陷。