攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In short, a determined missile strike on the island of Taiwan can be carried out in a manner guaranteeing its success, should the Chinese government wish to expend the number of weapons necessary to oversaturate the ATBM capable systems.
简而言之,在可以保证其成功性的前提下对台湾岛实施导弹攻击的决定就有可能被作出,这样一来中国政府就会希望扩充导弹的数量,以形成必要的对反战术弹道导弹系统的饱合攻击能力。
-
In short, a determined missile strike on the island of Taiwan can be carried out in a manner guaranteeing its success, should the Chinese government wish to expend the number of weapons necessary to oversaturate the ATBM capable systems.
简而言之,在可以包管其乐成性的条件下对宝岛实行导弹攻击的决定就有可能被作出,这样一来神州当局就会但愿扩充导弹的数目,以形成须要的对反战术弹道导弹体系的饱合攻击能力。
-
The method of fuzzy partitional cluster algorithm is applied to classify the multi-target in the air combat,to be aimed at the shortcoming of traditional algorithm in calculating attack strategy difficultly.This algorithm reduces the computational complexity,and raises the operating speed by considering multi-target as a whole.
针对传统多机多目标攻击不易解算攻击任务分配,且计算量大的问题,提出基于划分的多目标模糊聚类算法,该算法根据目标属性的相似性进行多目标分类,可以有效地降低多目标任务分配解算维数,减少运算量,提高解算速度。
-
Peiser contends that Habakkuk is the pseudonym of a Judean prince held as a hostage in Nineveh, and who witnessed the attack of the Medes, in alliance with Chaldea and Babylon, in 625 BC But his book announces a second attack.
peiser认为,哈巴谷是一个化名朱迪亚举行的王子作为人质,在尼尼微,谁目睹了攻击的玛代,在联盟与新巴比伦王国和巴比伦,在625年,但他的著作宣布的第二次攻击。
-
The original password authentication is vulnerable to guess attack and server personating attack . to overcome the vulnerability of this scheme , this paper designs a simple and efficient password authentication schema .
针对postgresql原有认证机制具有易遭受口令猜测攻击和服务器端假冒攻击的缺陷,本文设计了一种简单而有效的口令认证机制。
-
A security enhancement scheme is proposed to encounter the black hole attacks in aodv protocol . this scheme may solve the black hole problem and prevent personating the destination node to some degree .
针对移动adhoc网络aodv协议中所存在的黑洞攻击,提出了一种增强安全性的解决方案,该方案能在一定程度上解决黑洞问题并可防止假冒目的节点攻击。
-
A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm , which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack
该方案克服了通常的质询响应认证方案的弱点,可以用在网络环境下,实现通信双方的相互认证,防止重放攻击和冒充攻击,实现简单,执行效率高。
-
In the case of protecting against DDOS attacks, an attack detection algorithm identifies the characteristics of the traffic flow that will be policed.
在防止DDOS攻击的情况下,一个攻击检测算法鉴别会被管制的流量的特性。
-
The exaggerations of a few Probabilists who went too far in their laxity, gave an opportunity to the Jansenists to attack the system, and soon a number of scholars, notably among the Dominicans abandoned Probabilism, which they had defended till then, attacked it and stood up for Probabiliorism; some Jesuits also opposed Probabilism.
这个夸张了数probabilists人走得太远,在他们的懈怠,提供了一次机会,向詹森教徒攻击系统,并尽快多位学者,尤其是其中多米尼加人遗弃probabilism ,他们辩解到,然后,攻击它,并经历为probabiliorism ;一些耶稣会士也反对
-
The scheme adopts a multi-agent system and a threshold secret share technology, in which the secret information and the shares are carried by many different agents, adopts D-H key exchange technology to encrypt intermediate result to hide real intention of agent, to protect the privacy of agents and to enhance the reliability and the fault-tolerance capability of the mobile agent system. A mobile agent with limited authorization can sign a message on behalf of a user at far-end without divulging the user s private key. In order to avoid rebuilder attack the time-stampe mechanism is adopted.
运用信息加密和身份认证技术,实现了移动Agent和Agent平台间双向身份认证,有效地防止了恶意Agent对Agent平台的攻击或越权访问以及恶意Agent平台对Agent的攻击;引入远端可信任的代理平台作为数据处理平台,采用多代理系统和门限秘密共享技术,将加密信息和密钥由多
- 推荐网络例句
-
And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.
47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。
-
Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.
提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。
-
Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...
嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。