查询词典 sneak attack
- 与 sneak attack 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.
建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
The lurk's sneak attack can damage constructs,if sneak attack damage would otherwise apply on the lurk's attack(for instance,if the construct is flanked or flat-footed).
如果偷袭伤害适用于被潜伏者攻击的目标(例如,该构装体处于被夹击状态,或措手不及状态),则潜伏者的偷袭可伤害构装体。
-
Thus, flanking opponents gain no bonus on their attack rolls instead of +2, and rogues are denied their sneak arrack because you do not lose your bonus to Dexterity (but they may still sneak attack you if you are caught flat-footed).
因此,夹击你的敌人在攻击检定上并无+2加值,由于你并未失去对AC的敏捷加值,游荡者也不能偷袭你(但他们在你措手不及时仍可偷袭你)。
-
The lurk's sneak attack can damage undead creatures,if sneak attack damage would otherwise apply on the lurk's attackfor instance,if the undead is flanked or flat-footed
如果偷袭伤害适用于被潜伏者攻击的目标(例如,该不死生物处于被夹击状态,或措手不及状态),则潜伏者的偷袭可伤害不死生物
-
We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.
本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。
-
1605 Antiaircraft Artillery Regiment, 4 Bomber Aircraft Corps (202, 219, 321 Bomber Aircraft Division), 5 Ground Attack Aircraft Corps (4 Guards, 264 Ground Attack Aircraft Division), 8 Ground Attack Aircraft Corps (224, 227 Ground Attack Aircraft Division), 5 Fighter Aircraft Corps (8 Guards, 256 Fighter Aircraft Division), 10 Fighter Aircraft Corps (10 Guards, 235 Fighter Aircraft Division), 10 Guards Ground Attack Aircraft Division, 331 Fighter Aircraft Division, 208 Night Bomber Aircraft Division, 98 Guards, 50 Recon Aircraft Regiment, 372, 1002 Separate Artillery Regiment
第1254﹑1554﹑1555﹑1605防空炮团,第4轰炸机军(第202﹑219﹑321轰炸机师),第5强击机军(第4近卫强击机师,第264强击机师),第8强击机军(第224﹑227强击机师),第5歼击机军(第8近卫歼击机师,第256歼击机师),第10歼击机军(第10近卫歼击机师,第235歼击机师),第10近卫强击机师,第331歼击机师,第208夜间轰炸机师,第98近卫侦察机团,第50侦察机团,第372﹑1002独立炮兵团
-
Supply contact group, were positive,, mountain hafnium, butt Qi, Wang main parts such as automatic lathes, table lathes have, belts, steam-driven chuck Block, Grinding, open closed claw, Tool,òsmall motors, clutches, cam blanks, chuck, drilling chuck, cam, cam Events, cam thimble, tools, wheel discs, retaining materials arm, S plate, rolling round silk flower attack, attack left tooth wire, drill bits, L-drill, round bars, tungsten steel round bars, die, plate braces, dental regulation, cone, non-ditch attack silk, silk YAMAWA attack Japan, Japan OSG silk attack.
供应洽群、名阳、昌勇、山铪、錡夆、王主等自动车床零配件,有桌上车床、皮带、汽动夹头座、磨刀机、开闭爪、车刀、打油小马达,离合器、凸轮毛胚、夹头、钻尾夹头、凸轮、活动凸轮、凸轮顶针、车刀、砂轮碟,挡料臂、S型板、滚花轮丝攻,左牙丝攻、钻头、左旋钻头、圆棒,钨钢圆棒、板牙、板牙套、牙规、牙轮、无沟丝攻、日本YAMAWA丝攻、日本OSG丝攻。
-
Due to the limitation of attack effects on NASL scripts, we add new attack program description functions and attack property functions into the engine in order to extend NASL script. Then we use the extended NASL to give unification description to attack scripts and attack programs.
针对NASL脚本在攻击效果上的局限性,在NASL脚本引擎中,添加了攻击程序描述函数,以及攻击工具特征属性函数,完成了对NASL脚本语言的扩展,实现了攻击脚本与攻击程序的统一脚本化描述。
-
The sneak complier machine is an essential tool to the sneak system's development.
嵌入式编译器是嵌入式系统开发的一个必不可少的重要工具。
- 相关中文对照歌词
- Atak Of Da Bal-Hedz
- Attack
- Heart Attack
- Heart Attack
- Mr. Universe
- Attack
- Heart Attack
- Heart Attack Man
- Heart Attack
- Penguin Attack
- 推荐网络例句
-
A carrier gas such as nitrogen is directed through line 20 and valve 22 to connect with line 26 and mix with the gas sample.
如氮气之类的载体通过管线20和阀22引入,与管线26相通,与气体样品混合。
-
But for the most part, knaves and parasites had the command of his fortune
然而支配他的家产的大多是恶棍和寄生虫。
-
For he that is now called a prophet, in time past was called a seer.
他们就往天主的人所住的城里去了。