攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Assault: A violent physical or verbal attack.
攻击,抨击:武力或口头上的攻击
-
ABSTRACTOR :With the hacker of technology and hacker tool promotion , cause a large number of enterprise , organization , personal computer system suffer degree different invasion and attack, or face the danger attacked at any time.
字数:31557 页数:61 毕业论文带程序)摘要:黑客技术的提升和黑客工具的泛滥,造成大量的企业、机构和个人的电脑系统遭受程度不同的入侵和攻击,或面临随时被攻击的危险。
-
The SD-8 Accipiter is a flying Sentry Drone with assault capabilities, armed with an optical tracker and multi-barrel rotating cannons.
SD-8 "猎鹰"攻击机器人通过小队的NetBat系统锁定和攻击敌人,具有光学跟踪器和多管旋转式机炮。
-
Protocol analysis technology resolve several main problems: accurateness, capability, service, integration with other security system.
它是新一代IDS系统探测攻击手法的主要技术,它利用网络协议的高度规则性快速探测攻击的存在,因而它与具体的协议格式息息相关。
-
And the second logical fallacy is the ad hominem attack
的对手。而第二个是人身攻击-攻击那发表理论的人而不是合理性地讨论问
-
We transplant and improve the NASL script engine, utilize the improved engine to call attack scripts and attack programs.
同时,对NASL脚本引擎进行了移植和改造,利用改进的脚本引擎,实现攻击脚本与攻击程序的统一调用,在此基础上设计了基于扩展NASL脚本的攻击工具箱。
-
The toolkit makes use of plug-in technology, gives unification description and management to the attack tools and utilizes improved NASL engine to call them.
该工具箱利用脚本插件技术,在对攻击工具进行统一描述的基础上,实现攻击工具统一管理;利用改进后的NASL脚本引擎,实现攻击工具的统一调用。
-
Due to the limitation of attack effects on NASL scripts, we extend the NASL script language and use the extended NASL to give unification description to attack tools.
针对NASL脚本在攻击效果上的局限性,本文对NASL脚本语言进行了扩展,利用扩展的NASL脚本,实现攻击脚本与攻击程序的统一描述。
-
Especially after a series of impossible differential attacks on AES has been published, it is now considered to be one of the most effective cryptanalytic methods on AES.
尤其是近年来对AES的攻击,得到了一系列非常好的攻击结果,使得不可能差分分析已成为对AES最有效的攻击方法之一。
-
The corresponding color weighted diagraph was setup in dependence on the inference relation of the security holes in the intruded machine. With the vulnerability-log relation matrix, we searched different forensic information source and got the corresponding support value which could help to prune the false relation between the nodes and get the remote suspicious host. Then analyzing the suspicious host in the same way.
以漏洞间推理关系为前提,从受害主机入手,构造有色加权有向图,在多日志中查找漏洞被利用的解释信息,并由查找结果对漏洞链动态剪枝,得到主机漏洞攻击链和攻击该受害主机的嫌疑主机,对嫌疑主机迭代分析,推理出网络漏洞攻击链。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。