英语人>网络例句>可攻击的 相关的搜索结果
网络例句

可攻击的

与 可攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Anderson and Bushman proposed the General Aggressive Model, which could explain both the development of aggressive behavior and the difference of individual vulnerability to the effects of violent video games, and they advocated the effects, including short-term effects and long-term effects.

Anderson和Bushman在2002年提出了一般攻击模型,可解释青少年期间攻击行为的发展与暴力电子游戏影响易感性的个体差异,并提出游戏对于青少年的影响分为短期与长期效应。

You may not realized it, but your computer ports may be visible on the internet and that makes your computer a prime target for hackers and viruses.

你可能不知道,但是你的电脑端口,可通过互联网访问,这让你的电脑成为主要的攻击目标,为黑客和病毒的攻击。

The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, itcan realize the unknowability ofgroup's secretby constructing a secure distributed key generation protoco.l As a resul,t the proposed scheme is more secure than the two schemes.

结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。

A security enhancement scheme is proposed to encounter the black hole attacks in aodv protocol . this scheme may solve the black hole problem and prevent personating the destination node to some degree .

针对移动adhoc网络aodv协议中所存在的黑洞攻击,提出了一种增强安全性的解决方案,该方案能在一定程度上解决黑洞问题并可防止假冒目的节点攻击。

The second part of the thesis consists of three chapters, which focus on arguing for the rationality of "the unverifiable value judgment" from three points, the verification on the value judgment and emotion, the verification on value judgment and the language logic and the verification on the value judgment and rationality. The fourth chapter mainly discuss the verification on value judgment and emotion.

本文第二部分,即第四、五、六这三章,集中反驳&价值判断是不可证实的&这一论断的合理性,主要是从逻辑实证主义和情感主义对价值判断可证实性的三方面攻击入手,分别对情感与价值判断的可证实性、语言逻辑与价值判断的可证实性和理性与价值判断的可证实性三者进行再考察,第四章主要探讨情感与价值判断可证实性。

Orc. This kind of vermian camouflage becomes the picture document of user scrapbook, in when other user visits scrapbook, can breed and travel, the hacker can be in this process purloin is private information.

Orc攻击。这种蠕虫伪装成用户剪贴簿的图片文件,在其他用户访问剪贴簿之时便可繁殖并传播,黑客可在此过程中盗取私人信息。

If a remark impugns the dignity or integrity of a member, Chairman may, upon request of a delegate from the offended member, permit a reply by a delegate of the offended member following the conclusion of the controversial speech.

如果有发言对某一会员国的尊严和正直进行了攻击,主席可准许被攻击国行使答辩权。针对一国的答辩仅为一次,时间为1分钟。注意:这一权利在联大中使用的频率非常低,因为各国、各方的措辞一般都很规范和谨慎。我们不赞同代表滥用答辩权。

In this way every attack can be relaunched towards new network segments where the compromised machine could be connected, unreachable from the starting attack position.

这样,每攻击可以重新迈向新的网络部分受损机器可连接,从遥不可及的出发攻击位置。

S is going to renew its 'Space-War'plan,and openly threaten that such a space cruiser can be loaded 4500kg weapons and attack any target all over the world in two hours, and no country is able to take precautions against it and any country is unable to counterattack in selfdefence.

据最新报道:美国政府打算重新启动&太空战&计划,并扬言他们即将制造的太空巡洋舰可载4500公斤的武器,并可在两小时内对地球上任何一个目标进行攻击,任何国家任何民族都将无力反击,并无法预防。

Delivering combination hand techniques, the individual components of which both score in theirown right should be given Nihon.

混合的攻击技术,打到对手任何得分的部位,而每一单一的攻击均可得分,应给予2分。

第6/15页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?