ID 原文 译文
3283 首先,定义了联合兴趣度、转发历史比率和中继物理状态 3 个中继识别属性因子,并通过三角模糊函数计算三者的权重,从而对具有自私行为的中继设备完成识别。 Firstly, three relay identification attributefactors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined,and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.
3284 其次,基于理想解相似性偏好排序方法实现了中继设备的最终选择方案。 Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equip-ment selection scheme relay was realized.
3285 仿真结果表明,所提算法能更有效地识别 D2D 通信中的自私中继设备,与其他中继选择算法相比,在 D2D 通信转发成功率、系统平均吞吐量和平均时延等方面均取得了显著进步。 Simulation results show that the proposed algorithm can identify selfish re-lay devices more effectively in D2D communication. Compared with other relay selection algorithms, the proposedalgorithm has made significant progress in the aspects of D2D communication forwarding success rate, system aver-age throughput and average time delay.
3286 SQL 解析过程中利用随机化进行 SQL 注入攻击(SQLIA)防御的有效性是建立在攻击者不了解当前系统采用的具体随机化方法的基础上, The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection at-tack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted bysystem.
3287 因此,攻击者一旦掌握了当前系统的随机化形式,便能够实施有效的SQLIA。 Therefore, once attackers had mastered the current method of randomization who can launch effective SQLIA.
3288 为了解决该问题,基于多变体执行设计出一种 SQL 注入运行时防御系统,多变体间采用互不相同的随机化方法,攻击者注入的非法 SQL 无法同时被所有变体解析成功, In order to solve this problem, a SQL injection runtime prevention system based on multi-variant execution was designed,the multi-variant apply randomization methods from any other, so that illegal SQL statements could not be parsed suc-cessfully by all variants.
3289 即使在攻击者掌握了随机化方法的情况下,非法 SQL 也最多只能被某一变体解析成功,利用表决机制对多变体的响应结果或解析结果进行表决,及时发现异常,阻断 SQLIA 的攻击路径。 Even if attackers had mastered the method of randomization, illegal SQL statements could onlybe parsed successfully by a certain variant at most, meanwhile the parsing results of multiple variants were voted to findthe abnormality in time and block attack path.
3290 面向 Web 服务实现了原型系统 SQLMVED,实验证明该系统能够有效抵御 SQLIA。 The prototype system SQLMVED is implemented for Web services andexperiments show that the prototype can effectively defeat SQLIA.
3291 云计算的高虚拟化与高可扩展性等优势,使个人和企业愿意外包加密数据到云端服务器。 Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enter-prises are willing to outsource local data storage and computing to cloud servers.
3292 然而,加密后的外包数据破坏了数据间的关联性。 However, encryption breaks the link-ability between the data.