早教吧作业答案频道 -->英语-->
英语翻译AStudyontheSecurityFeaturesoftheParlayAPIbasedApplicationBehaviorPengJin,YangFang-chunStatekeylaboratoryofNetworkingandSwitchingTechnologyBeijingUniversityofPostsandTelecommunications,Beijing,ChinaEmail:pengjin@vi
题目详情
英语翻译
A Study on the Security Features of the Parlay API based Application
Behavior
Peng Jin,Yang Fang-chun
State key laboratory of Networking and Switching Technology
Beijing University of Posts and Telecommunications,Beijing,China
Email:pengjin@vip.163.com,fcyang@bupt.edu.cn
Abstract
New securityrequirements arise with the opening of
telecommunication networks via APIs.This paper presents
the risk analysis of network security caused by Parlay API
and proposes a Petri net based approach to analyze
application behavior when interacting with Parlay API.With
a time constraint predicate/transition Petri Net modeling,
normal behavior and abnormal behavior are distinguished.
A fuzzy set with membership function is defined to measure
possible abnormity degree of application’s behavior.
Keywords:Parlay API,security,Petri Net,Fuzzy set
A Study on the Security Features of the Parlay API based Application
Behavior
Peng Jin,Yang Fang-chun
State key laboratory of Networking and Switching Technology
Beijing University of Posts and Telecommunications,Beijing,China
Email:pengjin@vip.163.com,fcyang@bupt.edu.cn
Abstract
New securityrequirements arise with the opening of
telecommunication networks via APIs.This paper presents
the risk analysis of network security caused by Parlay API
and proposes a Petri net based approach to analyze
application behavior when interacting with Parlay API.With
a time constraint predicate/transition Petri Net modeling,
normal behavior and abnormal behavior are distinguished.
A fuzzy set with membership function is defined to measure
possible abnormity degree of application’s behavior.
Keywords:Parlay API,security,Petri Net,Fuzzy set
▼优质解答
答案和解析
一份研究报告的防伪特征,该Parlay API的基于应用的行为彭进,杨放春国家重点实验室网络和交换技术,北京邮电大学,北京,中国电子邮件:pengjin@vip.163.com ,fcyang @ bupt.edu.cn摘要
新securityrequirements出现的与开放的电信网络通过政府宣传短片.本文介绍了风险分析网络安全所造成的Parlay API的,并提出了基于Petri网的分析方法的应用行为互动时,与Parlay API的.经过一段时间的约束谓词/变迁网建模,正常行为和异常行为是尊敬.1模糊集与隶属函数的定义来衡量可能的异常程度的应用程序的行为.关键词:Parlay API的,安全,Petri网,模糊集
新securityrequirements出现的与开放的电信网络通过政府宣传短片.本文介绍了风险分析网络安全所造成的Parlay API的,并提出了基于Petri网的分析方法的应用行为互动时,与Parlay API的.经过一段时间的约束谓词/变迁网建模,正常行为和异常行为是尊敬.1模糊集与隶属函数的定义来衡量可能的异常程度的应用程序的行为.关键词:Parlay API的,安全,Petri网,模糊集
看了 英语翻译AStudyonth...的网友还看了以下:
选出每组单词中划括号部分读音不同的一项.1.A:t(o)day.B:t(o)morrow.C:st 2020-04-26 …
同胞们给我讲个A,T,C,G,U分别表示的意义?(忘了. 2020-05-15 …
椭圆方程式的题椭圆方程x^2/a^2+y^2/b^2=t怎么用y=f(u),x=f(u)表示如果椭 2020-05-16 …
函数f(x)在(0,+∞)连续,f(1)=5/2,对所有x,t∈(0,+∞),满足∫(1,x)f( 2020-05-19 …
设f(x)=定积分(ln(1+t)/t)dt(x>0),上限x,下限1,求f(x)+f(1/x)设 2020-07-09 …
A,T,C,G,U,的中文对应记忆方法 2020-07-20 …
(C/2)*K+(T/C)*F是如何换算为C=√(2T*F)/K 2020-07-24 …
写单词,这些单词打乱顺序了!:1.d,f,e,n,i,f,e,r,t,()2.g,h,o,e,t, 2020-07-26 …
与RNA相比较,DNA所特有的是()①P②A③T④C⑤G⑥U⑦核糖⑧脱氧核糖.A、③⑦B、⑥⑦C、 2020-07-29 …
对于积分上限函数∫(a,t)f(y)dy,知道被积函数是f(t).那么对于∫(a,t)f(x+y) 2020-08-02 …