受攻击
- 与 受攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
We exacted nothing less than an attack.
受攻击是预料到的。
-
The small force will excel in deep maneuvers into vulnerable enemy territory, with the hope that the enemy will give chase and surround it.
小型化军队在深入易受攻击的敌方境内机动方面有优势,敌人总是希望能够追击并包围它。
-
In the research of secure communication, the thesis analyzes some shortcomings of Diffie - Hellman"s crypt key exchanging protocol, presenting a new exchanging method based on the "station to station protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of IP datagram on router.
在对安全通信的研究中,本文分析了Diffie-Hellman密钥交换协议中易受攻击的地方,提出了基于端对端协议及cookie机制的密钥交换新方法,并在路由器上实现了密钥交换和IP报文的安全通信。
-
In a sense, indecency law is now even more vulnerable.
在某种意义上,不良信息法现在甚至更易受攻击和责难。
-
During the interwar period from 1919 to 1939, France formulated a weak and vulnerable strategy of forward defense, driven by her obsession with the methodical battle technique perfected at the end of World War I.
在两次战争的1919年到1939年期间,法国制定了一个弱势的,并且是易受攻击前线防御战略,她的前线防御战略被第一次世界大战的结尾的有条不紊的争斗技术的成见左右了。
-
But Mesopotamia had no clear boundaries, making it vulnerable to attack.
但是,美索不达米亚没有明确的边界线,使它易受攻击。
-
Mitchel, Lucien's 15years old son, is much quieter than his father and finds it less of a problem to appear vulnerable; much to his father's annoyance.
米切尔,路西恩15岁的儿子,比他父亲要安静得多,而且认为暴露自己易受攻击并不像他父亲烦恼地那样是个多大的问题。
-
In a previous column, I explained why obscenity law is vulnerable, from a constitutional law perspective.
在前一个专栏中,我解释了为什么淫秽信息法律从宪法角度易受攻击。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
The coast was undefended and lay open to attack.
该海岸未设防,易受攻击。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。