英语人>网络例句>攻击... 相关的搜索结果
网络例句

攻击...

与 攻击... 相关的网络例句 [注:此内容来源于网络,仅供参考]

"It is all designed to prevent the unauthorized disclosure of information, be it the simplest piece of information, such as whether or not that e-mail address or user id is actually a valid user ID on the site," Shipman said.

反钓鱼式攻击工作组的Jevans表示,蓝色安全公司的报告表明,一种新的钓鱼式攻击手段正在形成,他认为,网络组织应该采取措施,消灭注册与密码提醒式漏洞攻击。

Tartarus' attack type changed from normal to Undead attack. PLaSTiC

怪物 Tartarus 的攻击模式从普通攻击改变为怪物攻击。

Although the types of Web attack have been evolving, Web attacks are existed specific characteristics. These characteristics will be assigned a term list according to the establishment of taxonomy. This research intends to provide a complete and explicit taxonomy for Web attacks.

即使如此,每一件 Web 攻击都存在著特殊特徵,将 Web 攻击的特殊特徵经过知识分类的建立,指派於分类表的术语清单中,以提供 Web 攻击详细的描述,为本研究关心的议题。

The elliptical watermark is embedded additively in the spatial domain. The experimental results illustrate that the proposed scheme can resist kinds of geometric attacks.

实验结果表明该算法能有效抵御包括全局几何攻击和局部几何攻击在内的多类攻击。

They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi's SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin's protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame.

在2007年,Fouladgar和Afifi首先提出了离线式SiDES协定,接著Lin也提出了TCD-RP协定,可让后端伺服器可以授权读取器辨识标签的资讯,但Fouladgar和Afifi的SiDES定理,会遭受重送攻击、伪造攻击、阻断服务攻击以及不具有向前安全性的特性;而Lin的协定虽然使用时戳来做授权的控制,但在相同的时间区段下运作,并不具有向前安全性的特性。

"For the day-to-day types of attacks people are dealing with, the goal of trying to determine where the attack originates remains very elusive because most of the attacks involve bots," Amoroso said.

如果仅就其所占用的带宽和每秒的数据流量来看,这次攻击的数量和规模在我们曾经见到过的类似攻击中也只能算是中等规模的攻击。

Passing this method guaranteed the copular and dependable, lowering a flood of malice half link, because of credibility value, in certain time drive throw away very much to carry to calculate the deal, and resolve the this kind distribute type brush-off service attack, especially the series attack too many to take up with repeat to attack to the resources the problem that cause the system

通过此方法保证了连接的可靠性,对于大量的恶意半连接,由于存在可信度值,从而在一定时间内被丢弃,大大降低了运算量,从而解决了此种分布式拒绝服务攻击,特别是系列攻击和重复攻击对资源过量占用引起系统瘫痪的问题。

This paper defines a strong security model for multi-recipient signcryption scheme in the random oracle model, which is semantically secure against adaptive chosen-ciphertext insider attack, existentially forgeable chosen-message attack and anonymous chosen-ciphertext insider attack. By analyzing, we point out that Li-Hu-Liu Multi-Recipient Signcryption Scheme is insecure against the adaptive and anonymous chosen-ciphertext insider attacks.

摘要在随机预言模型下定义了一个多接收者签密方案的强安全性模型,该模型满足适应性选择密文内部攻击安全性、选择消息抗存在性伪造和密文匿名安全性;通过分析指出, Li、Hu和Liu等人提出的多接收者签密方案,不具有适应性选择密文内部攻击安全性和密文匿名性,并给出所定义强安全性模型中的攻击方法;随后提出改进方案,该方案在强安全模型中证明是安全的。

Because the tools of network attack are inundant and the protocol is imperfect, Distributed Denial of Service attack is an attack manner once leading to widest harm, which is hardest to defense.

由于网络攻击工具的泛滥,及网络协议的缺陷,使得分布式拒绝服务攻击成为网络中危害面广、难以防御的攻击方式。

These free radicals come from the metaboly of food and breath.

人体的每个细胞每天受到约10000次的自由基攻击,这些自由基来源于食物和呼吸的代谢,自由基的攻击方式严格遵循量子与正态分布原理,攻击的损伤程度取决于细胞营养状况、人体酸碱度等物理、化学状况。

第7/100页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
推荐网络例句

Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).

呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。

The cost of moving grain food products was unchanged from May, but year over year are up 8%.

粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。

However, to get a true quote, you will need to provide detailed personal and financial information.

然而,要让一个真正的引用,你需要提供详细的个人和财务信息。