易受攻击的
- 与 易受攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
During the interwar period from 1919 to 1939, France formulated a weak and vulnerable strategy of forward defense, driven by her obsession with the methodical battle technique perfected at the end of World War I.
在两次战争的1919年到1939年期间,法国制定了一个弱势的,并且是易受攻击前线防御战略,她的前线防御战略被第一次世界大战的结尾的有条不紊的争斗技术的成见左右了。
-
Leatherback sea turtles lay their eggs in nests on shore, where they are vulnerable to scavenging dogs and beach-strolling humans.
棱皮龟海龟下她们的卵在巢窝在岸边,在哪里她们是易受搜寻狗和海滩巡回演出的人的攻击。
-
These days, however, the outlets for vindictiveness have multiplied almost to infinity -- and your reputation is more fragile than ever.
但如今,发泄的途径近乎无穷无尽──人们的名誉变得前所未有的易受攻击。
-
Thesedays, however, the outlets for vindictiveness have multipliedalmost to infinity--and your reputation is more fragile thanever.
但如今,发泄的途径近乎无穷无尽──人们的名誉变得前所未有的易受攻击。
-
Scan finds that hundreds of thousands of the servers that act as the white pages of the Net are vulnerable to attack.
扫描发现成千上万的担当网络白页的服务器易受的攻击。
-
However, not everyone at Utah Valley State uses GroupWise—some are on Outlook—so the college remains vulnerable to virus attacks and, of course, spam.
不过,不是犹他谷州立大学的每个人都在使用GroupWise――有些人使用Outlook,所以学校仍然易受病毒当然还有垃圾邮件的攻击。
-
Emphasis here is on the predestined nature of the exchange: the ghost knew ahead of time when Xu would be vulnerable to thoughts of suicide, and even an outside observer does not alter the situation.38 Shi has different kinds of perception of hidden worlds, human and otherwise; he eavesdrops twice and looks through the window once.
这里强调了注定的交换类型:鬼事先知道姓徐的易受攻击,有自杀的念头,即使外界的观察者也不能改变这个局势。[38]石二对隐藏着的世界有不同的感觉,他偷听了两次,还通过窗户查看了一次。
-
At the same time, chaotic pseudo-random sequences generator based on nonlinear dynamic filter security model are constructed to select the frequency hopping points for NDFT, improving the overall system security. 3、Aiming at replay attack of networks in the remote speaker recognition systems and distributed databases speaker recognition systems, a time-stamp watermarking method is brought, which quantizes magnitude coefficients of NDFT. The time-stamp watermarking is embedded into the user's voice sample/voice characteristic information to resist on the replay attack.
同时该类算法采用以非线性动力学滤波器为基础的伪随机序列发生器构造跳频序列来选择频率变换点集合,有效提高了系统的安全性。3、针对远程说话人识别系统以及数据库分布式说话人识别系统存在易受网络重放攻击的缺陷,本文给出一种基于非均匀傅立叶变换的&时间戳&水印量化算法,通过把时间戳水印嵌入待识别用户的语音样本/语音特征信息中,可以有效解决此类缺陷。
-
Vulnerable to larger fishes, otters, bears, and fish-eating birds.
更多的鱼类、水獭、熊,和吃鱼的鸟易受攻击。
-
This key size is vulnerable to a brute force attack using current technology.
这主要是规模易受一种强力攻击,利用现有的技术。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。