• In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.

    方案提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。

    youdao

  • This sketch by Leonardo da Vinci is known as' Masquerader in the Guise of a Prisoner 'and is taken from an old book of printed sketches by da Vinci.

    这个素描大家熟知达芬奇囚徒扮演者》,来自于刊印达芬奇素描的旧书。

    youdao

  • This sketch by Leonardo da Vinci is known as' Masquerader in the Guise of a Prisoner 'and is taken from an old book of printed sketches by da Vinci.

    这个素描大家熟知达芬奇囚徒扮演者》,来自于刊印达芬奇素描的旧书。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定