英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

In theory; the use of the Lower Bowel Capsules does not allow anaerobic bacteria to thrive and there for people who consume the LBB formula has little to no indoxyl, thus they never loose their appendix, their tonsils, their spleen, their gallbladder nor their tyroid, the glands known as the HUMAN IMMUNE SYSTEM.

在理论上,应用低等肠道胶囊不允许厌氧菌繁殖和那里的吃 LBB 配方的人们有很少至没有吲哚酚,于是它们就绝对不会攻击他们的阑尾,他们的扁桃腺,他们的脾,他们的胆囊也不会攻击他们的甲状腺,这些腺体已知被当作人体免疫系统。

Some attacks described in the literatures are presented, which proved infeasible in the protocol.

给出了当前文献中已知的一些攻击方法,并证明这些攻击方法在此协议中是无效的。

On the basis of the enhanced resolution of 802.1x, the system adds a computer as the agent and detects the counterfeit accessing point and the promiscuous node in the network to prevent the intermediator and the conversation hijacking attack in the 802.1x.

该系统在802.1x增强性解决方案基础上,增加1台微机作为代理,对网络中的假冒接入点和混杂模式节点进行检测,以杜绝802.1x方案中的中间人攻击和会话劫持攻击

At the end of this paper, we investigate the invertible problem with the watermarking algorithms, and analyze the situation of image ownership dispute caused by the possible counterfeit attack for the reason of invertibility. Then we discuss one method based on one-way hash function to make the watermarking algorithms non-invertible, and another one using the time stamping protocol, to prevent the counterfeit attacks.

本文随后研究了水印算法的可逆性问题,对于由此可能发生的伪造攻击致使对图象所有权产生争议的情况作了分析,并且讨论了基于单向Hash函数的使水印算法不可逆的方法,以及采用时间戳协议以阻止伪造攻击的方法。

IRAG model deals well with the attack's intent and alternation of strategies, and takes account of incentives of system and attacker across-the-board.

该模型较好地解决了攻击意图及策略变化的问题,并全面考虑了系统、攻击者的收益等因素。

System incentive and alternation of attacker's strategies are not taken into full consideration in current intrusion response research. An intrusion response model (intrusion response based on attack graph, IRAG) based on the attack graph is proposed to solve this problem.

针对当前入侵响应工作中存在的不能充分考虑系统的收益,以及不能充分考虑攻击者策略变化因素等问题,提出了一种基于攻击图的入侵响应IRAG(intrusion response based on attack graph)模型。

Turkish expansionism has always been a part of palace politics: when a Sultan has felt secure at home he has attacked Europe; when a Sultan has felt threatened by his Janissary military commanders, he has sent them to attack.

土耳其的扩张一直是皇宫的一部分政治:当苏丹感到安全,他在家里攻击欧洲;当苏丹感到威胁他古时土耳其的禁卫军军事指挥官,他已经派他们去攻击

Generally speaking the snake attackstone will not bite and then release, the most bites not to put to be jilt to open, in this process is infuse into venom, so a feel painful will jilt to open as soon as possible right away, even have to the Teng make moves to come down its hard Ye, I see of the example be by hand the person who is attackstone to still try bye open a snake mouth, wasted plenty of time, the not so bad person has another and handles in time and leave city also not far, is otherwise much infused into of the venom will be troublesome

一般来说毒蛇攻击时不会咬到就放开,多数是咬着不放被甩开的,这过程中就在注入毒液,所以一感到痛就要马上尽快甩开,甚至必须腾出手把它硬拽下来,我见到的例子就是被攻击的人还试图用手掰开蛇嘴,浪费了很多时间,还好人多又处理及时,离城也不远,否则被多注入的毒液就会很麻烦

He described that, when a red-tailed eagle flying near a kingbird's nest and is ready to dive under the Go to their attack, when suddenly a bird flew up into the Eagles win the back, and used to attack eagle claw hook back.

他描述到,当时一只红尾老鹰飞近一只必胜鸟的巢穴,并准备俯冲下去对其进行攻击,这时必胜鸟突然飞上老鹰的背上,并用其钩爪攻击老鹰的背部。

Chu presented a Multicast Watermark Protocol, however, did not provide the schemes by which the fingerprint can be coded, so from the theoretical point of view, there does not exist the foundation for leaker identification and being collusion free, Furthermore, from the practical point of view, MWP cannot identify the leaker and be collusion free in the case of smaller amount of raw data.

Chu提出了一个多播水印协议MWP ,但没有研究如何进行指纹编码,因此在识别泄漏者、抵御合谋攻击方面缺乏理论依据,并且从实践的角度看,在原始数据量较小的情况下,MWP不能识别泄漏者,也不能抵御合谋攻击

第24/100页 首页 < ... 20 21 22 23 24 25 26 27 28 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。