受攻击
- 与 受攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
On the basis of retrospecting the development of intrusion detection technology, the problems incurrent intrusion detection systems are analysised. By comparing several kinds of intelligent methods in intrusion detection including artifical neural network, artifical immunity and data mining, we present that data mining is a perfect method to construct normal profile of protected system which is used in anomaly detection.
入侵检测作为一种主动防御手段,在其发展的过程中,有些问题一直没有得到很好的解决,如对未知攻击的识别与界定以及受保护系统正常模式的建立等,目前国内外普遍采用在异常检测中引入智能化方法来解决这些问题,例如采用神经网络、人工免疫、数据挖掘技术等等,其中数据挖掘是目前比较理想的一种方法。
-
They have argued that force must sometimes be used preventively, and that they must be free to decide when their national security requires it.
宪章》第八十一条重申&联合国会员国受武力攻击时,在安全理事会采取必要办法,以维持国际和平及安全以前,行使自卫之自然权利&。
-
Rapid Smiting is influenced by status physical attack power only and the weight and refine of the current equipped shield.
Dr.eye:迅速重击被受地位的影响物质攻击权力只和那些重量并且精炼具有这当今装备的盾。
-
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
现在已经证实有一个安全性问题,已通过验证的本机攻击者可能利用此问题使受影响的系统停止回应。
-
A security issue has been identified that could allow an unauthenticated, remote attacker to compromise your Microsoft Windows-based system and gain access to information.
现在已经证实有一个安全性问题,未通过验证的远端攻击者可能利用此问题使受影响的系统停止回应。
-
Attacking communists was the very job Vang Pao was paid to do by the CIA during the Secret War.
而攻击共产主义者是王宝在&秘密战争&期间受雇于CIA的特殊工作。
-
Trees will not be harmed by the follow-through damage from the Vorpal Blades.
必须升级穿刺投刃才能攻击树木,树木不受穿刺投刃的穿刺伤害。
-
One seems to take no damage from the other's attacks,and wins when he encases his opponent in ice.
一个看上去几乎不受另一个人攻击的伤害,当他用冰把对手围住时他取得了胜利。
-
The most massive defense system would still leave the nation vulnerable to nuclear attack.
最强大的防卫系统仍然难以防止国家受核武器的攻击。
-
The most massive defence system would still leave the nation vulnerable to nuclear attack.
最强大的防卫系统仍然难以防止国家受核武器的攻击。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。