ID | 原文 | 译文 |
2553 | 进而,总结了针对数据库水印的攻击行为,分析了特定水印技术的抗攻击性; | Next, we summarize the attack behavior against database watermarking and analyze the anti-attack ability of specific watermarking technology; |
2554 | 接着详细分析了基于失真与基于无失真的典型水印技术,并简要分析了数据库指纹的现有技术手段; | M oreover, we analyzethe typical watermarking technologies based on distortion or not and the existing technical methods of database finger-print briefly; |
2555 | 最后,指出各种现有的技术研究的关键与不足,提出了下一步可研究的方向。 | Finally, we point out the key and shortcomings of current researches, and propose the development direc-tion in the future. |
2556 | 信息技术已经深入到全社会政治、经济、文化的方方面面,信息革命改变了全世界的沟通方式,促使人类社会有了巨大的发展,也使网络安全问题受到了前所未有的关注。 | Information technology has penetrated into all aspects of politics, economy and culture in the whole socie-ty. The information revolution has changed the way of communication all over the world, promoted the development of hu-man society, and made the problem of network security get unprecedented attention. |
2557 | 针对网络安全问题的研究主要经历了理想化设计保证安全、辅助检测被动防御、主动分析制定策略、全面感知预测趋势 4 个主要阶段, | The research on network security has mainly experienced 4 main stages:idealized design ensures safety, passive defense after auxiliary detection, actively analyzeand formulate security strategies, forecast trend after comprehensive perception. |
2558 | 在各国都在争夺数字控制权的新战略制高点背景下,针对网络安全态势感知的探讨无论是在学术研究上还是在产业化实现上都呈现出了全新的特点。 | Under the background of the new strategiccommanding point for the power of digital control in all countries, the research on the Cyber Security Situation Awareness A-nalysis (CSSA)has presented new features in both academic research and industrialization. |
2559 | 本文对网络安全态势感知进行了尽可能详尽的文献调研,首先介绍了国内外研究现状及网络安全态势感知与传统态势感知之间的区别与联系; | This paper makes a detailed lit-erature survey on CSSA. First, it introduces the status of the research and the difference and connection between CSSA andtraditional awareness analysis. |
2560 | 然后从数据价值链角度提出了网络安全态势感知的逻辑分析框架,将整个过程分解为要素采集、模型表示、度量确立、求解分析和态势预测五个连续的处理阶段, | Then the logical analysis framework of CSSA is proposed from the perspective of data valuechain. The whole process is decomposed into five continuous stages of processing, including factor collection, model repre-sentation, measurement establishment, solution analysis and situation prediction. |
2561 | 随后对每个阶段的作用,主流的方法进行了阐述,并对在实验对象上的应用结果以及方法间的横向比较进行了说明。 | After that, the role and the mainstream meth-od of each stage are expounded, and the application results on the experimental object and the horizontal comparison betweenthe methods are explained. |
2562 | 本文意图对网络安全态势感知提供全景知识,为网络安全的产业化方案提供辅助思想,希望能够对此领域的科研和工程人员起到参考作用。 | The purpose of this paper is to provide a panoramic knowledge of CSSA, and to provide an auxil-iary idea for the network security industrialization scheme, and hope that it can serve as a reference for scientific research and engineering personnel in this field. |