攻击的
- 与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
When challenged with 1-4μg CT and 4 wild toxigenic strains of different biotypes and serogroups with 10〓-10〓CFU. respectively. IEM108 developed high antitoxic and significant vibriocidal immune responses to vaccination and confer full protection.
家兔主动保护试验也表明IEM108的抗活菌和纯品CT攻击能力均强于IEM101,IEM108能抵抗至少4μg的CT毒素的攻击,对四种毒株不同剂量的攻击均能提供良好的保护。
-
Evaluating the damage efficiency of the carrier plane groups under the attacking of multiple-submunition is a complicated problem. A rapid method was provided to evaluate the damage efficiency issue based on vulnerability analysis of the carrier plane group and using the pixel-simulation method, and a computation simulation model of the carrier plane groups under the attacking of submunition was established.
对于采用子母弹攻击航空母舰舰载机群的毁伤效果分析问题,存在相当大的难度,为对子母弹攻击舰载机群毁伤评估提供一个快速、初步的结果,在对舰载机群进行易损性分析的基础上,采用像素仿真的模拟方法,实现了多弹攻击下舰载机群毁伤效果的计算机模拟计算。
-
In the paper, we will assort the VoIP-related assailments by attack tree, and also forge the communications between users and attackers by using Honeypot to collect the information of the despiteful attackers.
本文中参考目前常见之VoIP相关的攻击手法,利用攻击树的架构做为分类,试著完整的表现出各种针对VoIP的攻击。
-
Raff expresses, metacafe website is put in flaw of an alternant script, this also is a common process designing error, but Raff can pass this flaw to run JavaScript scenario on Metacafe.com, this explains this flaw is used completely possibly to run baleful program by aggressor.
在Raff的攻击演示中,攻击者首先必须向Metacafe 和Dailymotion网站其中之一发布经过恶意编辑的视频文件然而Metacafe 网站本周二却表示,恶意攻击者突破该网站的内容过滤发布包括恶意代码视频文件的事"几乎不可能"。
-
This paper defines a strong security model for multi-recipient signcryption scheme in the random oracle model, which is semantically secure against adaptive chosen-ciphertext insider attack, existentially forgeable chosen-message attack and anonymous chosen-ciphertext insider attack. By analyzing, we point out that Li-Hu-Liu Multi-Recipient Signcryption Scheme is insecure against the adaptive and anonymous chosen-ciphertext insider attacks.
摘要在随机预言模型下定义了一个多接收者签密方案的强安全性模型,该模型满足适应性选择密文内部攻击安全性、选择消息抗存在性伪造和密文匿名安全性;通过分析指出, Li、Hu和Liu等人提出的多接收者签密方案,不具有适应性选择密文内部攻击安全性和密文匿名性,并给出所定义强安全性模型中的攻击方法;随后提出改进方案,该方案在强安全模型中证明是安全的。
-
The Honeypot is a strictly moni- tored network decoy,it can distract adversaries from valuable machines on a network,can provide early waming about new attack and exploitation trends,and allow in-depth examination of attacker's action and process during exploitation of a Honeypot.
蜜罐是个受到严密监控的网络诱骗系统,能将攻击从网络中比较重要的机器上转移开,对新攻击发出预警,同时可以在黑客攻击蜜罐期间对其的行为和过程进行深入的分析研究。
-
If you do this right, in two bashes you will be standing behind your enemy and have a positioning advantage.
当巨力重击触发后,若你站位得当,可以带来不小的优势;通常,当你面对敌方英雄攻击时,你将会将其向敌方塔德方向推送,因此,关键在于一旦触发巨力重击,你要立刻移动到对方的侧面并继续攻击,下次巨力重击触发后,立刻移动到对方的后面并继续攻击,如果你做到这些,那么只需两次重击,你就可以移动到敌方的后面,取得站位优势。
-
Second, a successful attack will also give the attacker a percentage of the defending player's credits, due to the attacking ships ransacking the resources and materials stored there.
第二,一次成功的攻击将会给攻击者带来一定比率的防御者的信用点,这是攻击者的舰队洗劫了资源和原料贮备。
-
The defenders that have been pressing on them are also looing back.
攻击他们的守军也在回望,当沉寂的时间已经远超过常规弹的引爆时间时,侥幸心理就暗示他们这是一发臭弹,攻击他们的人从地上爬起来回归攻击位置,几个人走向那处洞孔试图往里打量。
-
Especially after a series of impossible differential attacks on AES has been published, it is now considered to be one of the most effective cryptanalytic methods on AES.
尤其是近年来对AES的攻击,得到了一系列非常好的攻击结果,使得不可能差分分析已成为对AES最有效的攻击方法之一。
- 推荐网络例句
-
Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).
呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。
-
The cost of moving grain food products was unchanged from May, but year over year are up 8%.
粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。
-
However, to get a true quote, you will need to provide detailed personal and financial information.
然而,要让一个真正的引用,你需要提供详细的个人和财务信息。