英语人>网络例句>易攻击的 相关的搜索结果
网络例句

易攻击的

与 易攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on the vulnerability analysis to the carrier plane group and aimed to the issue of quantitative,the damage effectiveness of submunition against carrier plane group is analyzed,the model of pixel-simulation is established,and the computer simulating calculation of damage effectiveness of the shipboard aircraft group under the attacking of many missiles is carried out.

是子母弹对航空母舰毁伤效果分析的第三部分。在对舰载机群进行易损性分析的基础上,针对子母弹战斗部攻击舰载机群毁伤效果的定量分析问题,提出了基于像素仿真的模拟方法,实现了多弹攻击下的舰载机群毁伤效果的计算机模拟计算。本研究对航空母舰毁伤效果的评估和火力计划方案的制定具有重要指导意义

Evaluating the damage efficiency of the carrier plane groups under the attacking of multiple-submunition is a complicated problem. A rapid method was provided to evaluate the damage efficiency issue based on vulnerability analysis of the carrier plane group and using the pixel-simulation method, and a computation simulation model of the carrier plane groups under the attacking of submunition was established.

对于采用子母弹攻击航空母舰舰载机群的毁伤效果分析问题,存在相当大的难度,为对子母弹攻击舰载机群毁伤评估提供一个快速、初步的结果,在对舰载机群进行易损性分析的基础上,采用像素仿真的模拟方法,实现了多弹攻击下舰载机群毁伤效果的计算机模拟计算。

According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.

据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。

Results The appearance of behavior problems was difference if the children's four dimensionality was...

外化、内化、失调和能力四个维度为阳性与阴性的儿童中行为问题的发生均有差异;外化或失调维度得分高的儿童易出现攻击行为,不易出现抑郁行为;内化维度得分高的儿童易出现社会退缩;能力维度得分高的儿童不易出现破坏和社会退缩行为。

In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.

本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。

Results: The two groups were signifcent different in BRMS and the dinical charaters.imply that the active,agression factor,dinical character of agressive history,irritably of BRMS were the agressive behavor danger factors.

结果:两组躁狂症患者在BRMS和临床特征上存在显著差异,提示BRMS的动作活动、敌意因子分和临床特征中既往有攻击史,易激惹、不合作及医护人员的强制手段是躁狂症患者的攻击行为的危险因素。

Methods:a total of 50 patients of manic with agressive behavor and 50 patients with no agressive behavor were compaired with their rebation data.results: the two groups were signifcent different in brms and the dinical charaters.imply that the active,agression factor,dinical character of agressive history,irritably of brms were the agressive behavor danger factors.conclusions: to give nurse intervene and heath cducation in manic with agressive behavor early could decrease the agessive behavor mostly.

采用对照分析法,对50例有攻击行为的躁狂症患者和50例无攻击行为的躁狂症患者的相关资料进行分析和显著性检验。结果:两组躁狂症患者在brms和临床特征上存在显著差异,提示brms的动作活动、敌意因子分和临床特征中既往有攻击史,易激惹、不合作及医护人员的强制手段是躁狂症患者的攻击行为的危险因素。结论:及早对躁狂症攻击行为患者实施心理干预及健康指导,可以将攻击行为减少到最低限度。

At the same time, chaotic pseudo-random sequences generator based on nonlinear dynamic filter security model are constructed to select the frequency hopping points for NDFT, improving the overall system security. 3、Aiming at replay attack of networks in the remote speaker recognition systems and distributed databases speaker recognition systems, a time-stamp watermarking method is brought, which quantizes magnitude coefficients of NDFT. The time-stamp watermarking is embedded into the user's voice sample/voice characteristic information to resist on the replay attack.

同时该类算法采用以非线性动力学滤波器为基础的伪随机序列发生器构造跳频序列来选择频率变换点集合,有效提高了系统的安全性。3、针对远程说话人识别系统以及数据库分布式说话人识别系统存在易受网络重放攻击的缺陷,本文给出一种基于非均匀傅立叶变换的&时间戳&水印量化算法,通过把时间戳水印嵌入待识别用户的语音样本/语音特征信息中,可以有效解决此类缺陷。

But even in countries without extremist parties on the left or the right, politicians will be tempted to deflect the voters' wrath away from their corporate paymasters and towards an easier target—" foreigners" of all types.

但即使是在无极左或极右党派的国家,政治家亦倾向于将选民的愤怒从公司发薪人员身上移开,而转向一个更易受攻击的目标——所有的&外国人&。

This paper starts with latent exposure to attack the network of government organization, combining the experience and the technology of network safety management, discusses the feasibility and correlation for strengthening self guard configuration and utilizing safe reinforcing cover to find the solution scheme that suits the network safety of government organization.

该文从政府机关网络易受攻击的潜在暴露点入手,结合网络安全管理的技术和经验,对强化自身的防范配置、运用安全加固套件的可行性和相关性进行了研究和探讨,以求找到适合于政府机关网络安全的解决方案。

第3/7页 首页 < 1 2 3 4 5 6 7 > 尾页
推荐网络例句

Lugalbanda was a god and shepherd king of Uruk where he was worshipped for over a thousand years.

Lugalbanda 是神和被崇拜了一千年多 Uruk古埃及喜克索王朝国王。

I am coming just now,' and went on perfuming himself with Hunut, then he came and sat.

我来只是现在,'歼灭战perfuming自己与胡努特,那麼,他来到和SAT 。

The shamrock is the symbol of Ireland and of St.

三叶草是爱尔兰和圣特里克节的标志同时它的寓意是带来幸运。3片心形叶子围绕着一根断茎,深绿色。