英语人>网络例句>攻击的 相关的搜索结果
网络例句

攻击的

与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

When an animal is attacked or threatened by another animal of higher status, that animal may attack or threaten another animal of lower status presumably because it is not a good idea to aggress against an animal of higher status.

当个体被另一个高于它身份的体恐吓或攻击时,它同样将这类的恐吓及攻击转向比它身份低或相等的另一个体身上。

The skill sets needed to penetrate a network for intelligence-gathering purposes in peacetime are the same skills necessary to penetrate that network for offensive action during wartime, notes a recent congressional report on China's alleged clandestine cyberattacks in the U.S. According to the report, released in October by the congressionally mandated U.S.

和平时期这些手段能够用来侵入网络,收集情报,在战争时期就可以用同样的手段侵入网络,做出攻击,一份最近的美国国会报告中如是写道,这份报告就是关于中国对美国实施的所谓秘密网络攻击。

Coss says he and his colleagues did not did not study mountain lion encounters or near-attacks because they wanted to get a handle on the best way to put off a lion bent on attacking.

Coss称,他和同事的目的是想找到一个延缓狮子攻击倾向的最佳方法,因此他们没有研究遭遇美洲狮或者攻击未遂的情况。

At present, the ability of counteracting geometric attacks hasnt completely achieved the request of application.

目前数字水印算法的抗攻击能力还不能完全达到应用的要求,几何变换攻击被认为是提高水印算法鲁棒性的关键问题。

We formalized a notion of security for partial delegation with warrant proxy signature schemes, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosen-warrant attack. We compare the new model with the previous formal models and identify their weakness.

重新给出了具有证书的部分代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,建立了形式化安全模型。

Once these forces had redeployed north, this powerful German secondary attack could fix these forces there, while the main German offensive lanced through their rear.

一旦这些兵力被重新部署在北部,这些强大的德国第二攻击力量将会把这些兵力困在那里,同时德军的主要攻击将插入盟军的后方。

Whenever it uses the additional AR given by skills.txt is unknown, Brother Laz noticed that even the regular vanilla elemental arrows may be bugged and ignore their AR bonus.

它是否使用skill.txt中的附加攻击率还不知道,Brother Laz注意这对到正常的元素箭存在bug和忽略他们的攻击率奖率。

The intrusive detection technology, as an important security measure for computer network information, and a dynamic safety protection technology, provides real-time protection to interior and exterior attacks and maloperation, and could intercept and respond the intrusion before the network system is endangered.

入侵检测技术是计算机网络信息安全检测的重要手段之一,入侵检测作为一种动态的安全防护技术,提供了对内部攻击、外部攻击和误操作的实时保护,在网络系统受到危害之前拦截和响应入侵。

The method of fuzzy partitional cluster algorithm is applied to classify the multi-target in the air combat,to be aimed at the shortcoming of traditional algorithm in calculating attack strategy difficultly.This algorithm reduces the computational complexity,and raises the operating speed by considering multi-target as a whole.

针对传统多机多目标攻击不易解算攻击任务分配,且计算量大的问题,提出基于划分的多目标模糊聚类算法,该算法根据目标属性的相似性进行多目标分类,可以有效地降低多目标任务分配解算维数,减少运算量,提高解算速度。

A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm , which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

该方案克服了通常的质询响应认证方案的弱点,可以用在网络环境下,实现通信双方的相互认证,防止重放攻击和冒充攻击,实现简单,执行效率高。

第100/100页 首页 < ... 92 93 94 95 96 97 98 99 100
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?