英语人>网络例句>攻击... 相关的搜索结果
网络例句

攻击...

与 攻击... 相关的网络例句 [注:此内容来源于网络,仅供参考]

When challenged with 1-4μg CT and 4 wild toxigenic strains of different biotypes and serogroups with 10〓-10〓CFU. respectively. IEM108 developed high antitoxic and significant vibriocidal immune responses to vaccination and confer full protection.

家兔主动保护试验也表明IEM108的抗活菌和纯品CT攻击能力均强于IEM101,IEM108能抵抗至少4μg的CT毒素的攻击,对四种毒株不同剂量的攻击均能提供良好的保护。

In this paper, the demand and measure of security for the internet tax payment system in our work have been introduced. The investigation and analysis of the real security in the internet tax payment system reveal that the secure risks are mostly from damages of software and hardware, malice code, virus attack, error operation of legitimate user, attack and destruct of malice assaulter and hacker.

本文以作者的实际工作为基础,对网上报税系统的安全需求及已采取的安全措施进行了简要介绍,通过对网上报税系统安全现状的调查和分析,了解到其安全威胁主要来自系统的软硬件故障、恶意代码和病毒的攻击、合法用户的误操作、恶意攻击者或黑客利用系统的安全漏洞及管理上的漏洞进行恶意攻击和破坏等几方面。

There is a type of immune infertility where the woman produces antibodies to her partner's sperm. It's a kind of isoimmunization. Another type of immuni infertility is autoimmunization where the man produces antibodies to his own sperm or the woman produces antibodies to her own ovum.

所谓精子的免疫,就是太太的免疫系统攻击先生的精子,这是属於同种免疫;当先生的免疫系统攻击自己的精子,或太太的免疫系统攻击自己的卵子,以上这两者就是属於自体免疫。

The Azov amphibious assault warship thought it was coming under fire from Georgian forces and radioed for permission to open fire on the "attack", reported Russia's RIA Novosti news agency.

亚速海号两栖攻击舰认为自己遭到格鲁吉亚部队的攻击,并针对此一「攻击」,发送无线电要求淮予开火还击,俄罗斯RIA通讯社报导说。

At present ,most of research in the area of attacks has focused on classifying and categorizing attacks and the analysis of details of a specific attack.

目前,关于攻击的大多数研究都集中于攻击的分类和攻击细节的分析上,仅靠这些还很难掌握攻击的本质。

From the martial standpoint the previous level of training is limited in that it cedes considerable power to the attacker by allowing him to decide what and when an attack will be.

从武术的观点,上述的阶段受限於转移力量到攻击者,在转移力量之前,攻击者可以选择攻击方式及何时攻击。

XSS worms will become increasingly intelligent and highly capable of carrying out dilapidating attacks such as widespread network denial of service attacks, spamming and mail attacks, and rampant browser exploits.

跨站脚本蠕虫将变得越来越聪明,开展这种服务攻击,垃圾邮件攻击和拒绝破损广泛的网络攻击的能力,以及猖獗的浏览器攻击。

Firstly, the article introduced the principle of SYN Flood attack, and then put forward the design and realization of the defense system, on this basis, according to the objectives and content of the defense attacks test, carried out the simulation attack and defense; and at last introduced the implementation of the attack and defense in detail.

首先介绍了SYN Flood的攻击原理,提出了防御系统的设计和实现方案;在此基础上,根据攻击防御测试的目标和内容,实施了仿真模拟攻击及防御;并详细介绍了攻击及防御实施的过程。

Honeypots are a well known technique for discovering the tools, tactics, and motives of attackers.

密罐是一种用来发现攻击工具,攻击策略与攻击者攻击动机的知名技术。

In testing datasets, Snmpguess attack is misjudged as normal connection due to hidden feature transformation. We analyzed this attack connection and re-extract characteristics of the connection. The modified attack detection rates go up from 0.08% to 100%..

此外针对测试资料集中的Snmpguess攻击因特徵转换隐藏的问题,造成此一攻击会被误判为正常连线,我们透过分析此种攻击的连线特性,并重新取出连线特徵,修正后此类型攻击的侦测率由0.08%提升至100%。

第4/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

In the negative and interrogative forms, of course, this is identical to the non-emphatic forms.

。但是,在否定句或疑问句里,这种带有"do"的方法表达的效果却没有什么强调的意思。

Go down on one's knees;kneel down

屈膝跪下。。。下跪祈祷

Nusa lembongan : Bali's sister island, coral and sand beaches, crystal clear water, surfing.

Nusa Dua :豪华度假村,冲浪和潜水,沙滩,水晶般晶莹剔透的水,网络冲浪。