攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
If, for example, the drone from which the fatal attack on Atef was launched had sensed that his car was overtaking a school bus, it might then have held fire.
比方说,如果遥控飞机根据所提供的信息对阿特夫发动致命攻击准备就绪后探测到他的汽车正赶上了一辆校车,那么遥控飞机就可能暂停对他进行发射攻击。
-
The campaign was quite creative, there were many new tricks like the attackable rock and capturing the castle when it was damaged enough.
这部战役极富创意。有很多新的技术效果,比如可攻击的岩石、攻击城堡从而占领它。
-
Change Phase: Boss - When all of the adds are dead, XT-002 will resume his attacks and become attackable again.
改变阶段: boss -所有小罗罗被击杀以后,XT-002会继续它的攻击,同时也变为可以被攻击状态。
-
At-Will Attack Powers:'''When a power or some other effect lets you use an at-will attack power, you can choose to use one of your augmentable at-will attack powers, but you must use it unaugmented.
随意攻击威能:'''当一项威能或其他效应让你使用随意攻击威能时,你可以选择去使用你的任一项可强化随意威能,但你必需无强化地使用它。
-
This aggression occurs when an animal learns that an aggressive response will enable it to escape or avoid aversive stimuli.
此等攻击的发生是当动物学会攻击能逃避厌恶刺激。
-
To address this problem, a new method of security analysis of QKD protocols is introduced. Based on the equivalence attack model of QKD protocols which is refered to Biham's proving, the protocol is divided into two parts: the body and the attack, then a Petri-net model of BB84 is obtained, and a security analysis is followed.
为了简化量子密码协议的安全性证明以及建立一种通用的证明方法,基于Petri 网提出一种量子密钥分配协议的形式化分析方法,根据Biham 的等效对称化攻击模型,将协议分为主体模型和攻击模型两部分,建立了BB84 协议的Petri 网模型,然后对模型进行安全性分析,分析结果表明, BB84协议是无条件安全的。
-
The chess pieces are used to both attack and defend from attack, against the other players chessmen.
的棋子被用来攻击和防守都免受攻击,对其他球员棋子。
-
The skill sets needed to penetrate a network for intelligence-gathering purposes in peacetime are the same skills necessary to penetrate that network for offensive action during wartime, notes a recent congressional report on China's alleged clandestine cyberattacks in the U.S. According to the report, released in October by the congressionally mandated U.S.
和平时期这些手段能够用来侵入网络,收集情报,在战争时期就可以用同样的手段侵入网络,做出攻击,一份最近的美国国会报告中如是写道,这份报告就是关于中国对美国实施的所谓秘密网络攻击。
-
Coss says he and his colleagues did not did not study mountain lion encounters or near-attacks because they wanted to get a handle on the best way to put off a lion bent on attacking.
Coss称,他和同事的目的是想找到一个延缓狮子攻击倾向的最佳方法,因此他们没有研究遭遇美洲狮或者攻击未遂的情况。
-
At present, the ability of counteracting geometric attacks hasnt completely achieved the request of application.
目前数字水印算法的抗攻击能力还不能完全达到应用的要求,几何变换攻击被认为是提高水印算法鲁棒性的关键问题。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。