攻击的
- 与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Some attacks described in the literatures are presented, which proved infeasible in the protocol.
给出了当前文献中已知的一些攻击方法,并证明这些攻击方法在此协议中是无效的。
-
On the basis of the enhanced resolution of 802.1x, the system adds a computer as the agent and detects the counterfeit accessing point and the promiscuous node in the network to prevent the intermediator and the conversation hijacking attack in the 802.1x.
该系统在802.1x增强性解决方案基础上,增加1台微机作为代理,对网络中的假冒接入点和混杂模式节点进行检测,以杜绝802.1x方案中的中间人攻击和会话劫持攻击。
-
IRAG model deals well with the attack's intent and alternation of strategies, and takes account of incentives of system and attacker across-the-board.
该模型较好地解决了攻击意图及策略变化的问题,并全面考虑了系统、攻击者的收益等因素。
-
Chu presented a Multicast Watermark Protocol, however, did not provide the schemes by which the fingerprint can be coded, so from the theoretical point of view, there does not exist the foundation for leaker identification and being collusion free, Furthermore, from the practical point of view, MWP cannot identify the leaker and be collusion free in the case of smaller amount of raw data.
Chu提出了一个多播水印协议MWP ,但没有研究如何进行指纹编码,因此在识别泄漏者、抵御合谋攻击方面缺乏理论依据,并且从实践的角度看,在原始数据量较小的情况下,MWP不能识别泄漏者,也不能抵御合谋攻击。
-
Is then the federal government destitute of every authority for restraining the licentiousness of the press, and for shielding itself against the libelous attacks which may be made on those who administer it?
那么,是联邦政府为了限制放任自由,以及为屏蔽对他可能的攻击,这些攻击或许会针对那些管理者,而剥夺新闻界的一切权力?
-
These methods can effectively reject the attack of the baleful programs or codes, and by use of the audit record, we can analyse the attack and find out the malefactor eventually.
这一系列的措施可以使我们有效的进行事前抵御攻击和事后分析攻击。
-
The perfidious military attack on our fatherland, begun on 22 June by Hitler's Germany, is continuing
希特勒德国于6月22日对我们的祖国发动背信弃义的武装攻击,目前攻击还在继续进行。
-
In this paper, a new way of self-protecting network from attacker when network is in potential risk within campus network is proposed which could potentially protect the network security.
这里要实现的网络自防御攻击系统是一种在校园网络受到内部潜在的安全威胁时,如何及时将有害攻击源或被感染源隔离起来,及时通知用户采取安全措施,从而保证网络安全稳定运行。
-
A silk moth caterpillar comes with a false head, complete with mock antennae, to lure predators into biting its rear. Plan B: If the ruse fails, extra spines on the real head may prompt the attacker to spit out its prey still intact.
蚕蛾毛虫就有一个假头,甚至长有假触角,在天敌攻击时诱惑对方咬它的后部。B计划是:一旦措施不奏效,它们真正头部的刺便会迫使攻击者马上将它们吐出,从而避免伤害。
-
Then finally, I could pitch out a corpse spider attack, which causes opponents, when killed, to erupt into ravenous swarms of sickly green arachnids that skitter toward and inflict violence on whatever's near.
最后,我可以透支蜘蛛尸体来攻击,当杀死敌人后会爆发绿色网状的贪婪蜂群攻击任何靠近的敌人。
- 推荐网络例句
-
Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).
呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。
-
The cost of moving grain food products was unchanged from May, but year over year are up 8%.
粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。
-
However, to get a true quote, you will need to provide detailed personal and financial information.
然而,要让一个真正的引用,你需要提供详细的个人和财务信息。