查询词典 malicious
- 与 malicious 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In order to avoid malicious users defacing the Fedora Project Wiki, we have had to restrict edit access a little .
为了防止不怀好意的人破坏 Fedora Project Wiki,我们不得不对编辑权限做限制。
-
This kind of malicious attacks can even cause some biggest web sites on the world become deniable to legal customers,partners,and users.
这一恶意攻击甚至可以导致一些大型的网络拒绝合法顾客,合伙人和用户的服务。
-
But keeping in mind that the extravert is not being intentionally malicious, the introvert has at least two options for handling this in a polite way.
但是外向的人并非故意这样做。对于这种情况,内向的人有两种礼貌的解决方式。
-
The YAHOOS were the most filthy, noisome, and deformed animals which nature ever produced, so they were the most restive and indocible, mischievous and malicious; they would privately suck the teats of the HOUYHNHNMS' cows, kill and devour their cats, trample down their oats and grass, if they were not continually watched, and commit a thousand other extravagancies.
&雅虎&是大自然所生的一种最肮脏、最有害、最丑恶的动物,因此它们最为倔强而又不可驯服,恶毒而又惹事生非;要不是经常看管着它们,它们就偷偷地去吮食&慧马&养的母牛的奶,杀死并吃掉它们的猫,践踏坏它们种的燕麦和青草;还有许多别的无礼行径。
-
In the traditional trust evaluation methods, various hypotheses are put forward for the evaluated entities, and the inveracious recommendation of malicious customers can not be avoided, so the objectivity and creditability of the evaluation result is affected.
传统的信任评估方法对评估对象提出种种假设,不能分辨恶意客户的虚假推荐,因而影响了评估结果的客观性和可信性。
-
While the transaction in good faith is protected, the malicious transaction should be given negatory evaluation, so that the real owner's rights would be balanced.
在保护善意交易的同时,必须对恶意利用瑕疵登记进行交易的行为作出否定性的评价,以平衡真实权利人的权益。
-
Nonsignature systems used to detect previously unknown malicious code fall into two categories.
用于侦测未知恶意代码的非特征值技术可分为两类。
-
A distributed secure clustering protocol is proposed, in which the secure network initialization, random number broadcast from the base station and one-way hash chain are used to achieve the resiliency against possible attacks including node personating, cluster-head occupying, malicious cluster-member recruiting and multiple cluster-membership attacks.
针对成簇协议所面临的各种安全威胁,提出了一种分布式安全成簇协议,通过网络安全初始化、可信基站的随机数广播和单向密钥链技术来有效地抵御节点伪装和簇首占据攻击、簇成员恶意征募攻击和多重簇成员身份攻击。
-
For this cause, if I come, I will advertise his works which he doth, with malicious words prating against us. And as if these things were not enough for him, neither doth he himself receive the brethren, and them that do receive them he forbiddeth, and casteth out of the church.
为此,我若来到,必要指摘他所行的事,就是他用恶言恶语诽谤我们的事;但这为他还不够:他自己不款待弟兄们,连那愿意款待的,他也加以阻止,甚而将他们逐出教会。
-
Wherefore, if I come, I will remember his deeds which he doeth, prating against us with malicious words: and not content therewith, neither doth he himself receive the brethren, and forbiddeth them that would, and casteth them out of the church.
所以我若去,必要提说他所行的事,就是他用恶言妄论我们,还不以此为足,他自己不接待弟兄,有人愿意接待,他也禁止,并且将接待弟兄的人赶出教会。
- 推荐网络例句
-
The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.
主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。
-
Male cats normally do not need aftercare with the exception of the night after the anesthetic.
男猫通常不需要善后除了晚上的麻醉。
-
Its advantage is that it can be used in smaller units.
其优点在于可以在较小的单位中应用。