英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

By 5ft/line of sight Extraordinary Abilities: Selective damage, 72 Secret Transformation, Monkey hairs Special Qualities: Instantaneous movement Saves: Fort+27, Ref+31, Will+21 Ablilities: Str29, Dex29, Con20, Int27, Wis8, Cha26 Skills: Balance+19, Bluff+35, Escape Artise+42, Hnadle Animal+19, Hide+35, Knowledge+24, Knowledge+24, Knowledge+24, Knowledge+24, Knowledge+24, Knowledge+24, Listen+34, Move Silently+37, Pick Pocket+30, Scry+28, Sense Motive+25, Spot+32, Tumble+42 Feats: Alterness, Ambidexterity, Blind-Fight, Combat Reflexes, Deflect Arrows, Dodge, Expertise, Improved Trip, Improved Two Weapon Fighting, Improved Unarmed Strike, Leadership, Mobility, Quick Draw, Spring Attack, Whirlwind Attack Climate/Terrain: Any land Organization: Unique Challenge Rating: No hope Treasure: Only magic Alignment: Chaotic netural Combat Selective Damage: Monkey's preferred weapon, the Iron Ballast Rod, once used to keep the oceans calm is immensely large and heavy.

翻译如下中体形魔法兽生命骰:20d10+100(210hp)优先权:总是先攻速度:瞬移,飞行瞬移 AC: 35(+9 敏捷,+4 天生,+12 凤凰甲)措手不及:26,接触:19 攻击:金箍棒+27/+22/+17/+12 近战,拳头+27/+22 近战伤害: 1d1000 金箍棒, 2d12+9 拳头面宽/触及: 5尺x5尺/视线以内特异能力:选择性伤害, 72变,毫毛特性:瞬间移动豁免:强韧+27,反射+31,意志+21 属性:力量29,敏捷29,体质20,智力27,感知8,魅力26 技能:平衡+19,唬骗+35,逃脱+42,驯养动物+19,躲藏+35,知识+24,知识+24,知识+24,知识+24,知识+24,知识+24,聆听+34,潜行+37,扒窃+30,探知+28,察言观色+25,侦察+32,滚翻+42 专长:警觉,双巧手,盲斗,战斗反射,拨挡箭矢,闪避,寓守于攻,精通拌摔,精通双武器攻击,精通徒手打击,领导力,灵活移动,即时备战,跳跃攻击,旋风攻击气候/地形:任何地面组织:唯一挑战级数:无望宝藏:只有魔法物品阵营:混乱中立战斗选择性伤害:猴子的首选武器——定海神针铁,曾一度被用于保持海洋的稳定——极其巨大与沉重。

Based on the above analysis, and on the foundation of analyzing the existing probability reputation model, especially beta distribution reputation model, a formal reputation model based on Gaussian distribution has been discussed.

仿真实验表明,基于高斯分布的形式化信誉模型更接近最新的信誉,信誉振荡幅度小,在抵抗合谋攻击、诋毁攻击、身份攻击等典型的信誉攻击方面具有更强的抵御能力。

First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given.

首先介绍攻击仿真的测试目标和内容,并提出了攻击仿真系统和仿真平台的设计和实现的详细方案;同时,在此基础上,对该平台的设计和实现的3个关键技术:测试数据的选择、攻击技术的分类研究、攻击测试域及其划分等进行了进一步的分析,最后给出并分析了实验测试结果。

Based on the research in the representative attacking ways ,we analyse the attacking classifications presented by Craver、Hartung、Voloshynovskiy、Boris、Cox and ect.

在对这些典型攻击方法研究的基础上,分析Craver、Hartung、Voloshynovskiy、Boris和Cox等学者的攻击分类,结合隐蔽分析等新的攻击方法,提出了一种新的数字水印攻击分类。

It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.

在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。

In the strand spaces, atomic behavior of the attackers is the definition of the attackers trace description. It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.

在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。

With the recent advances in implementation techniques, the researches on Honeypot have attracted a lot of attention.

重要的是,Honeypot技术可以对攻击行为进行监控和分析,了解攻击者所使用的攻击工具和攻击方法

Where contact is deemed by the referee to be too strong, but does not diminish the competitor's chances of winning, a warning may be given. A second contact under the same circumstances will be penalised by KEIKOKU and IPPON, given to the opponent. A third offence will be given HANSOKU CHUI and NIHON, to the injured competitor. A further offence will result in disqualification by HANSOKU.

如果裁判认为接触太重,但并不影响被攻击选手获胜的机会,攻击者将被判处口头警告﹝忠告〝CHUKOKU〞﹞,同样的情况下第二次触击,攻击者将被判处警告﹝KEIKOKU﹞,被攻击者获得一胜〝IPPON〞﹝一分﹞,第三次犯规者将被判处犯规注意,被攻击者获得二胜〝NIHON〞,第四次犯规者将被判处犯规而失去资格。

Due to the limitation of attack effects on NASL scripts, we add new attack program description functions and attack property functions into the engine in order to extend NASL script. Then we use the extended NASL to give unification description to attack scripts and attack programs.

针对NASL脚本在攻击效果上的局限性,在NASL脚本引擎中,添加了攻击程序描述函数,以及攻击工具特征属性函数,完成了对NASL脚本语言的扩展,实现了攻击脚本与攻击程序的统一脚本化描述。

Secondly, the pseudo-chaotic stream cipher based on searching plaintext in a pseudo-random symbolic sequence is analyzed, by several successful cryptanalytic attacks such as one-time pad attacks, bifurcation diagram attacks, entropy attacks, differential attacks and key recovery attacks etc..

第二章研究了基于搜索机制的数字混沌序列密码算法,并详细分析了包括一次一密攻击,分叉图攻击,熵攻击,差分攻击以及基于符号动力学的攻击方法。

第2/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。