attack [ə'tæk]
- attack的基本解释
-
vt.
攻击, 抨击, 动手干
- The governor was attacked by the press for failing to keep a campaign promise.
- 州长因没能履行一项竞选时的承诺而受新闻界抨击。
- Strong acids attack metals.
- 强酸腐蚀金属。
- The enemy attacked our airport all night.
- 敌人彻夜都在攻击我们的机场。
- He was attacked with dysentery.
- 他患痢疾。
-
vi.
攻击
-
n.
攻击, 评击
- He's recovering from an attack of flu.
- 他的流行性感冒快好了。
- 相似词
- 拼写相近单词
- attacco
- attach
- attachable
- attachableness
- attache
- attached
- attacher
- attaches
- attaching
- attachment
- attack所属的单词分类
-
Military / 军事
[225]
national security · gunnery sergeant · dog tags · armored vehicle · amphibious vehicle · Zulu time · Purple Heart · PT boat · bow and arrow · rocket artillery
-
Pirate / 海盗
[221]
walk the plank · Skull and Bones · desert island · asea · Jolly Roger · yo-ho-ho · x marks the spot · Treasure Island · pieces of eight · outcasts
- 更多 网络例句 与attack相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.
建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.
本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。
- 更多网络解释 与attack相关的网络解释 [注:此内容来源于网络,仅供参考]
-
attack:攻击
22 简报中频繁地使用当我们谈到安全时,经常会使用到的其它字眼,像是"攻击"(attack)、 "恶意的代码"(malicious code)、 "欺骗"(spoofing)以及"可信赖的"(trusted).
-
attack:进攻
比赛时,各球队根据自身情况可采用不同的战术,例如"进攻"(attack)、"防守"(defence)和"全攻全守"(total football). 所谓"进攻",即球员要尽力进球得分;"防守"的重点在于球员应尽可能不输球;而"全攻全守"是一种既强调整体,
-
attack:发作
9.倾倒发作(attack)是本病较少见的一种特殊症状. 发作前病人并无预兆,常在站立或行走时发生,头颈转动或过度伸屈时更易发生. 病人因下肢肌张力突然消失而倒地,意识清楚,视力、听力、讲话均正常,能立即站起并继续活动.
-
attack:攻击力
先要说的是最好的戒指--邪恶之戒(Evil Ring),虽然它装备后带有诅咒的负作用,但是使用它能放出四级雷魔法(BOLT),更诱人的是装备它能加8点攻击力,相当于使用了一次加攻击力(ATTACK)魔法.
-
out-of-band attack:带外攻击
OSI Model 开放系统互连模式 | out-of-band attack 带外攻击 | packet filter 分组过滤器
- 加载更多网络解释 (19)