The first IAT implicit self-aggressive beliefs investigated, including the property concept word and the word of the offensive class; the second IAT implicit attack assessment visits, including the evaluation of word and attack word. 第一个IAT是内隐自我攻击性信念考察,包括了属性概念词与攻击性类词;第二个IAT是内隐攻击性评价考察,包括了评价词和攻击类词。
The results showed that there was no difference in the two types of test including the implicit self attack belief, implicit attack assessment, the two types of subjects there is a significant difference. 结果显示两类被试在内隐自我攻击性信念上没有差异,而在内隐攻击性评价上,两类被试存在着显著的差异。
From technical perspective, the key technologies of vulnerability and attack threat assessment involved in network security evaluation are researched deeply in this paper. It mainly includes : Firstly, we carry out research on modeling methods for network vulnerability. 本文从技术角度出发,对网络系统安全性评估中涉及的脆弱性评估和攻击威胁评估等关键技术进行了深入研究,主要包括以下四个方面:首先,对网络脆弱性的建模方法展开研究。
Firstly, the target damage rank assessment was divided into the target vulnerability assessment and the target suffering attack degree assessment two processes. Then the correlated variables which influence target damage rank assessment were analyzed. 首先将目标毁伤等级评估分为目标易损性评估和目标遭受打击力度评估两个过程,接着分析了影响目标毁伤等级评估的相关变量,并在此基础上建立了目标毁伤等级评估的动态贝叶斯网络模型。
A scale-free network model was constructed by using the four proposed aggressive strategies to attack and survivability assessment. 构建了无标度网模型,用提出的四种攻击策略进行攻击,同样对抗毁性进行评价。