查询词典 attacks
- 与 attacks 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
We also present the recent results we obtained about algebraic attacks and some other attacks on stream ciphers.
同时介绍了我们得到的关于代数攻击以及流密码攻击方法的一些最新研究成果。
-
Some results of algebraic attacks on stream ciphers are summarized and algebraic attacks on nonlinear combiners are ...
本文总结了流密码代数攻击的一些已有结果,对非线性组合生成器的代数攻击做了较为详细的讨论。
-
The DDOS attacks are "Denial of Service" attacks where massive amounts of traffic is sent to the website whereby disallowing legitimate web traffic to reach the website.
DDOS进攻是&服务的否认&进攻什么地方厚重的交通的数量是送到网络站点凭什么不接受合法的网交通到达到网络站点。。
-
Masters of the defensive arts, Guardians use taxing attacks and irksome taunts to draw and hold opponents' attention, relying on their shield and weapon to turn aside incoming attacks with blocks and parries.
作为防御艺术的大师,守护者用强大的攻击力和令人厌恶的嘲讽技能来吸引对手的注意,并依靠他们的盾和武器来格挡和躲避直接攻击。
-
AFP, Jerusalem) Israeli authorities claim that during the three weeks the Israeli military reoccupied the West Bank, Israel has prevented 18 suicide attacks and other attacks.
法新社耶路撒冷电以色列当局宣称,在以军重新占领约旦河西岸的三周期间,以色列方面阻止了十八次自杀攻击和其他的攻击行动。
-
Distributed Denial of Service attacks, especially spoofed DDoS attacks, are a serious threat to the Internet.
分散式阻断攻击对网路是一个严重的威胁,尤其是伪造来源的分散式阻断攻击,更是严重。
-
Yet the Gazans continued the war. They turned Gaza into a base for launching rocket attacks against Israel and for digging tunnels under the border to conduct attacks such as the one that killed two Israeli soldiers on June 25 and yielded a wounded hostage brought back to Gaza.
然而巴人将战争延续,他们把加萨当成发动飞弹攻击以国的基地,还在边界下方挖掘地道进行突击,在六月二十五日杀害两名以国士兵,且掳走一名伤兵到加萨。
-
Experiments show that the algorithm has a good invisibility and resistance to most geometry attacks, such as rotation, small rescaling, shifting, and MPEG compression. Experiments also show that the algorithm has a good robustness against temporal synchronization attacks, such as frame insertion attack, frame drop attack, frame transposition attack.
实验表明算法具有不错的不可见性,并能很好的抵抗诸如旋转、放大、平移、压缩编码等几何攻击和帧插入、帧删除、帧交换等时域同步攻击。
-
The attacks against us began in the 1920s, escalated into a comprehensive attack in 1948 with the declaration of Israel's independence, continued with the fedayeen attacks in the 1950s, and reached their peak in 1967, on the eve of the six-day war, in an attempt to tighten a noose around Israel's neck.
1947年,当联合国通过建立犹太国与阿拉伯国的分治决议时,犹太社团欢天喜地、载歌载舞地接受了这个方案,而整个阿拉伯世界坚辞不受。阿拉伯人拒绝接受任何犹太国家,不论形态如何,边界何在。
-
Sophos, including some of the security company had warned such as Facebook and MySpace social networking sites such as, saying they have become hotbeds of the special hacker attacks, because they have enormous user base, many of the developers, and the dissemination of malicious attacks on the many channels , Such as information, such as posts.
包括Sophos在内的一些安全公司曾警告诸如Facebook和MySpace之类的社交网站,称它们已经成为黑客攻击的特别温床,因为它们拥有巨大的用户群,众多的开发者,以及传播恶意攻击的诸多渠道,如信息、帖子等。
- 推荐网络例句
-
I am accused of being overreligious," she said in her quiet, frank manner,"but that does not prevent me thinking the children very cruel who obstinately commit such suicide.""
客人们在卡罗利娜·埃凯家里,举止就文雅一些,因为卡罗利娜的母亲治家很严厉。
-
Designed by French fashion house Herm è s, this elegant uniform was manufactured in our home, Hong Kong, and was the first without a hat.
由著名品牌 Herm è s 设计,这件高贵的制服是香港本土制造,是我们第一套不配帽子的制服。
-
Do not 'inflate' your achievements and/or qualifications or skills .
不要 '夸大' 你的业绩或成果,条件或者技能。