英语人>网络例句>attack 相关的网络例句
attack相关的网络例句

查询词典 attack

与 attack 相关的网络例句 [注:此内容来源于网络,仅供参考]

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

Epee competition counter-movements and the choice of timing in the basic factors determining the success or failure of counter-offensive, if you do not know the timing of the use of counter-movements and the basic concepts of the use of counter-attack in the game can not be carried out in accordance with the basic concepts of counter-attack game, then a successful counter-offensive may be significantly decreased.

重剑比赛中反攻动作及时机中的选择是决定反攻成败基本因素,如果不知道使用反攻动作和时机的基本概念,在比赛中运用反攻就不可能按照反攻的基本概念进行比赛,那么反攻成功的可能会大大下降。

Imitate server attack ; dynamic password authentication ; cryptographic protocols ; jacking connection attack ; Diffie-Hellman key exchange algorithm

冒充服务器攻击;动态口令认证;密码协议;劫取连接攻击; Diffie-Hellman密钥交换算法

The simulation results demonstrate that the straight slope formal attack angle change rule has better time adjustability in corner section and higher turning efficiency than the exponential attack angle change rule, which provides a theory reference to the study of relevant field.

结果表明,直线斜率形式的迎角变化规律相对于指数形式的迎角变化规律具有转弯段时间可调性强、转弯效率高的优点,该项研究为相关领域研究提供了理论参考。

Aiming at improvement of attack precision and reduction of target miss distance, different guidance and control laws are proposed and analyzed, the influences of many different kind of conditions to attack precision such as initial flying altitude, airspeed, flight path angle, external disturbance and target movement are investigated. Beneficial to theoretical significance and inspiring for engineering practice results are obtained.

紧紧围绕提高末制导精度、减小脱靶量这一研究目的,对不同的末制导控制方式、不同的末制导导引律、不同的末制导进入条件、不同的外部干扰、不同的目标特性等都进行了深入的研究、分析和探讨,并给出具有一定理论意义和丰富的工程实际应用价值的结论。

During the Second World War, the "swing-role" fighter-bomber reappeared in Allied and Axis service, complementing and eventually replacing the specialized attack airplane as the major instrument of air-to-ground battlefield attack.3

在第二次世界大战期间,具有"角色转换"功能的战斗-轰炸机再次出现在同盟国和轴心国的军队里,补充并最终取代了作为空对地战场攻击主要手段的专用攻击机。

As for Galaxian Explosion, I don't think Shaka can stop it completly, because what we saw in OVA 8 when Saga used the attack, he didn't use his full powers in this attack because if he used his full powers I am sure the temple at least would be destroyed a little, but what we saw there!!

因为读者认为在处女宫时撒加没有完全地发挥此招的威力,如果撒加是完全用出这一绝招的全部威力,那么处女宫不会只毁坏一些部分(题外话:大家知道银河星爆是撒加的最大奥义,当星爆的威力达到顶峰时,可以毁灭银河里的星星,所以威力肯定不只这么一点,否则,原著作者车田也无需为星爆作此定义了)读者说他并没有看到处女宫有什么大的损坏。

These are mainly intended to be anti-personnel attack vehicles but they also have an extremely long-range glaive attack.

这些车辆主要用来对单个玩家的攻击,而且它们也可以也有一个非常长程的攻击。

Results:Before surgery, 39 patients with paroxysmal pain, after surgery, 84 patients with pain immediately disappeared, reaching 94.4%, 12 patients with mild throat discomfort, 2 patients with cough of short-term drinking water, 1 patient with hoarseness, the follow-up in the 3 months to restore Conclusion:Preoperative care focus on patients with Glossopharyngeal neuralgia are primarily on the preparation and pre-operative pain attack, as much as possible to avoid the attack of the pain, postoperative complications, mainly care, treatment and care through to complications as soon as possible.

结果:39例术前出现发作性疼痛,术后89例患者立即止痛者达94.4%,12例出现轻度咽部不适,2例出现短暂的饮水呛咳,1例出现声音嘶哑,经随访在3个月内恢复。结论:舌咽神经痛术前的护理重点主要是术前准备和疼痛发作,尽量通过治疗和护理的避免疼痛的发作,术后主要是并发症的护理,通过治疗和护理促使并发症的尽快恢复。

The improved e-N method can also yield results well agree with those obtained by DNS.4 The transition prediction for boundary layers on cones with different key parameters such as angle of attack, cone half angle and the Mach number of the coming flow, have been made, to show the reliability of the modified e-N method.5 For the calculation of base flow, boundary layer equations can be used in the case of small angle of attack.

但是它要依赖于对初始扰动的正确预估,这显然又取决于更多飞行数据的积累和分析。e-N方法的转捩预测结果与直接数值模拟得到的结果也吻合较好。4通过对不同来流攻角、不同半锥角和不同马赫数的三维圆锥边界层的转捩位置进行预测,证实了改进的e-N方法对于三维边界层转捩预测是可靠的。5对于基本流的计算,边界层方程可以用于小攻角的情况,其计算量远远小于直接数值模拟,但背风面的剖面不可靠。

第10/100页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
相关中文对照歌词
Under Attack
Hard Attack
Heart Attack At 23
Heart Attack
Panic Attack (The P.A.)
Heart Attack
Love Attack
Heart Attack Man
Heart Attack
"Attack! Attack! Attack!"
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。