英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

U.S. network security monitoring organization Shadowserver Foundation volunteers Stephen A Daer said that they found the President of Georgia, site of the attack order is a "zombie" network attacks, that is secretly controlled by hackers over computer networks, to the target site Sending a large amount of requests and caused huge traffic, from the target site visit to slow and stop services.

阿达尔表示,他们发现攻击格鲁吉亚总统网站的命令是一种&僵尸&网络攻击,即由黑客暗中控制多个计算机网络,向目标网站发送大量请求,造成巨大流量,引起目标网站访问缓慢,并停止服务。

Results: The two groups were signifcent different in BRMS and the dinical charaters.imply that the active,agression factor,dinical character of agressive history,irritably of BRMS were the agressive behavor danger factors.

结果:两组躁狂症患者在BRMS和临床特征上存在显著差异,提示BRMS的动作活动、敌意因子分和临床特征中既往有攻击史,易激惹、不合作及医护人员的强制手段是躁狂症患者的攻击行为的危险因素。

It is shown that the cryptosystem withstands some brute-force attacks and the simultaneous Diophantine approximation attack.

证明了该密码体制能够抵抗一些暴力攻击及联立丢番图逼近攻击

Phase Boots will certainly give you more attack damage and movement speed, however Power Treads give you the IAS that you so direly need. The +10 strength will also increases your health by 190 and provide you with +10 damage.

相位鞋当然会给裂魂人带来更多的攻击伤害和更快的移动速度,但假腿带来的攻击速度加成正是裂魂人所迫切需要的,同时,10点力量也可以增加你190点的血量和10点的攻击力。

The Galeb Duhr's basic attack is useful but rather plain, aside from the fun you can have yelling "I'm attacking with my Fist!"

哥砣石人的基本攻击很有用但是有点单调,所以你可以来点搞笑大喊『我用我的拳头攻击

We also prove that the new scheme is not only indistinguishable against chosen-ciphertext attacks but also existentially unforgeable against chosen-message attacks.

可证明新方案在选择密文攻击下不可区分,在选择消息攻击下存在不可伪造。

We formalized a notion of security for partial delegation with warrant proxy signature schemes, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosen-warrant attack. We compare the new model with the previous formal models and identify their weakness.

重新给出了具有证书的部分代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,建立了形式化安全模型。

We formalize a notion of security for proxy multi-signature and multi-proxy signature, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosenwarrant attack.

本文给出了代理多重签名和多重代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,并建立了形式化安全模型。

Yuval Ben-Itzhak, chief technology officer for Finjan, a web security group with headquarters in San Jose, California, says his company is in the middle of a study into new hacking techniques that has found "a centralised group of activity based from China".

他们表示,中国电脑攻击活动增多,导致英国军情五处(MI5)处长乔纳森·埃文斯上周致信英国企业和银行主管,警告称,中国国有机构的黑客攻击可能危及敏感的商业数据。

Firebolt is safe and effective-the "Old Reliable" of the Sorcerer's arsenal.

它发射消耗低,对自身安全,攻击有效性强,是术士的可靠的攻击魔法。

第36/100页 首页 < ... 32 33 34 35 36 37 38 39 40 ... > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。