查询词典 attacks
- 与 attacks 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The paper analyzes the Principle of ARP Attacks, and puts forword the prevention methods for the ARP attacks.
本文分析ARP攻击的基本原理,并提出相关的ARP 攻击的解决方案。
-
Especially in the 19FB in physical attacks on their own point of injury in less than Lingbo not beyond the basic physical沾身monster magic attacks only a few can be on one's own, the use of sub-skills at the same time once all the monster-ching.
尤其是在19FB中物理攻击对本身伤害就少在点过凌波以后物理怪物基本不沾身只有法术攻击才能打自己几下,同时使用次技能可一次清完所有怪物。
-
Chen Shaoxiong's work has been marked by a tenacious desire to function as response: in the urbanizing Guangdong of the 1990s, he worked through new forms of public life ; after the terrorist attacks of the early 2000s, he presented options for avoiding future attacks; in the opening moments of the financial crisis in 2008, he invented BOCCA, the Bank of Chinese Contemporary Art.
陈劭雄作品的特点是其希望成为社会生活的一个回应:在上个世纪90年代广东的城市化进程中,他的作品致力于探讨新的公共生活方式;本世纪初那场恐怖袭击之后,陈劭雄创作作品以期探讨如何避免更多的袭击;2008年经济危机开始的最初几个月里,他"创造"了BOCCA——中国当代艺术银行。
-
In the fourth chapter, firstly it introduces the Boolean functions algebraic expressions of the 2-value clock-controlled stop-and-go generator and Gunther generator. It reveals the balanced property of the two kinds of Boolean functions, and studies the Walsh cycle spectrum and the autocorrelation function. It also obtains the coincidence rate of their output sequences with affine sum of some bits of input sequences, and analyzes their ability of resisting the best affine approximation cryptanalysis and differential cryptanalysis. Secondly, we properly present a new definition of the Best Affine Approximation, namely BAA on the Boolean vector functions, followed by the spectral characteristic of such defined BAA attacks through using the decomposition formula of the union distribution for random variables. A lower bound of such BAA attacks is proposed. Finally, we also study the spectral characteristic of the second kind of nonlinearity of Boolean vector functions, followed by a higher bound of such nonlinearity. Furthermore, the limited relationship between the second kind of nonlinearity of Boolean vector functions and the linear structure of the linear combination of every component is analyzed.
在第四章中,首先给出了2值密钥流"停走生成器"和"衮特生成器"中实际存在的布尔函数的代数表示,揭示了这两类布尔函数的平衡性,随后研究了它们的Walsh循环谱和自相关函数等,得到了它们的输出序列与输入序列中的某些bit的仿射项的符合率,分析了它们抵抗最佳仿射逼近攻击和差分攻击的能力;其次,我们合理地给出了布尔向量函数最佳仿射逼近的新定义,利用布尔随机变量联合分布的分解式考察了相应的谱特征,并给出了布尔向量函数与其最佳仿射逼近的符合率的一个下界;最后,我们还考察了布尔向量函数第二类非线性度的谱特征,给出了布尔向量函数第二类非线性度的一个上界,并揭示了布尔向量函数第二类非线性度与其各个分量的线性和的线性结构之间存在的制约关系。
-
This paper introduces a computer virus production and development, discussed the principle of computer virus attacks and attacks.
本文简要介绍了计算机病毒的产生和发展,讨论了计算机病毒的攻击原理和攻击方式。
-
It gains better performance on periodical attacks over non-periodical attacks. IEEW is more suitable to DoS attacks. By constructing characters on normal flow, SMEW predicts unknown attacks with anomaly flow.Proposing an Intrusion Response Technical ArchitectureMost of active intrusion response technologies are covered.
前者依据特定攻击发生的历史规律,预测网络攻击的未来发生次数,同时分析了时间粒度对预测结果的影响,以及算法对周期性攻击和非周期性攻击的预测效果;后者通过建立正常流量测度指标,对新型攻击的发生进行预测。
-
XSS worms will become increasingly intelligent and highly capable of carrying out dilapidating attacks such as widespread network denial of service attacks, spamming and mail attacks, and rampant browser exploits.
跨站脚本蠕虫将变得越来越聪明,开展这种服务攻击,垃圾邮件攻击和拒绝破损广泛的网络攻击的能力,以及猖獗的浏览器攻击。
-
LDoS (low-rate denial-of-service) attacks are stealthier and trickier than the traditional DDoS attacks. According to the characteristic of periodicity and short burst in LDoS flows, a detectionsystem DSBWA (detection system based on wavelet analysis) against LDoS attacks has been designed andimplemented based on feature extraction using wavelet transform.
低速率拒绝服务攻击(low-rate denial-of-service,简称LDoS)比传统的DDoS攻击更具隐蔽性和欺骗性,依据其周期性脉冲突发特点,设计实现了一种基于小波特征提取的LDoS 检测系统DSBWA(detection system based on wavelet analysis)。
-
The security world is becoming an expert in fighting Trojans, viruses and eradicating phishing and zero day attacks.
世界的安全正成为一个专家在打击木马,病毒和钓鱼式攻击和消除零一天attacks。
-
Secondly, the pseudo-chaotic stream cipher based on searching plaintext in a pseudo-random symbolic sequence is analyzed, by several successful cryptanalytic attacks such as one-time pad attacks, bifurcation diagram attacks, entropy attacks, differential attacks and key recovery attacks etc..
第二章研究了基于搜索机制的数字混沌序列密码算法,并详细分析了包括一次一密攻击,分叉图攻击,熵攻击,差分攻击以及基于符号动力学的攻击方法。
- 推荐网络例句
-
I am accused of being overreligious," she said in her quiet, frank manner,"but that does not prevent me thinking the children very cruel who obstinately commit such suicide.""
客人们在卡罗利娜·埃凯家里,举止就文雅一些,因为卡罗利娜的母亲治家很严厉。
-
Designed by French fashion house Herm è s, this elegant uniform was manufactured in our home, Hong Kong, and was the first without a hat.
由著名品牌 Herm è s 设计,这件高贵的制服是香港本土制造,是我们第一套不配帽子的制服。
-
Do not 'inflate' your achievements and/or qualifications or skills .
不要 '夸大' 你的业绩或成果,条件或者技能。