英语人>词典>汉英 : 攻击用的 的英文翻译,例句
攻击用的 的英文翻译、例句

攻击用的

基本解释 (translations)
offensive

更多网络例句与攻击用的相关的网络例句 [注:此内容来源于网络,仅供参考]

Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. vtc authors brad causey and bobby rogers present computer security from an angle that aims to put you into the seat, to protect your network through ethical hacking and penetration testing.

了解哪些攻击可能被用来攻击你的系统已经成为一项基本的安全常识。vtc 的作者 brad causey 和 bobby rogers 通过黑客和渗透测试来展示给你电脑安全方面的问题,以保护你的网络。

It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.

在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。

In the strand spaces, atomic behavior of the attackers is the definition of the attackers trace description. It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.

在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。

After discussion of the relation of MR〓 and ALT, an algorithm proposed by Zhongping Qin and Huanguo Zhang, two conclusions are obtained: if a weak key can be successfully attacked by the method of reduced echelon matrix, it can also be successfully attacked by a linear R〓R〓 transformation; meanwhile, there exists such a weak key that can be successfully attacked by the algorithm MR〓 or linear R〓R〓 transformation, but this key can not be successfully attacked by the algorithm ALT. For a NFA, according to the number of solutions for the image equation of its R〓R〓 transformation, there exist two sufficient criteria about its weak invertibility and weak inverse.

通过比较MR〓与覃中平和张焕国提出的攻击FAPKC加密情形的算法ALT,证明了如下结果:凡用约化梯阵方法能攻击成功,用线性R〓R〓变换也能攻击成功;同时,存在着用算法MR〓或线性R〓R〓变换攻击成功的弱密钥,用算法ALT攻击失败。

Finally, the formula of steganographic capacity under passive attacking or active attacking is described.(3) Under analyzing the maneuver of information hider and attacker in a steganographic system, the sets of strategy for hider and attacker is set up.

从一个新的角度,用对策论的观点研究信息发送者和攻击者行为,给出了构造发送者与攻击者的策略集,进而建立隐秘通信系统对策论模型的方法和求解最优策略的算法。

Neutralizing potency of the patent recombinant anti-rabies virus McAbs, SO57 and SOJB,have been investigated broadly to different rabies virus strains in various animal models.100% Chinese Hamsters could be protected by 100IU/kg SO57 against China prevalent street rabies virus named SBD.We firstly established the mouse model to simulate human postexposure prophylaxis by rabies virus and found SO57 had the same function with HRIG against CVS or three China typical street rabies viruses.However,HRIG could not 100% protect the mice challenged with SBD street virus,rabies virus vaccine alone could not save life from rabies virus infection.The cocktail containing SOJB and SO57(1:1) did not do better than SO57 alone.

用不同的动物模型研究了具有专利的重组人抗狂犬病病毒单克隆抗体SO57、SOJB对不同狂犬病病毒株的中和作用,100IU/kg的SO57能100%保护被中国街毒株SBD攻击的中国仓鼠;首次用小鼠模型模拟人体被狂犬病病毒攻击后的治疗情况,在小鼠被CVS及中国街毒代表株攻击后,SO57与HRIG具有相近的对小鼠的暴露后保护作用;同时结果显示HRIG对SBD株攻击的保护率不能到达100%,仅使用疫苗是不能对感染病毒的小鼠百分之百的保护;SOJB与SO57 1:1联合使用未显示比SO57单独使用更好的保护效果。

In its article "Disintegrating Communist Culture", Falun Gong denounced antitheism advocated by CCP by chapter and verse, saying:"there are gods and spirit right above your head". They even quoted ancient Chinese fables such as "Pan Gu Creating the universe".

法轮功在其近期大作&解体党文化&里用大量篇幅攻击中共的无神论,引经据典地说明&头上三尺有神灵&,甚至把中国古代&盘古开天地&的神话、封建帝王&君权神授&的说法也用于其攻击无神论的佐证。

Approximately 75% of the attacks were firebombs thrown at Israeli soldiers and civilians.

大约75%的攻击是用丢掷汽油弹攻击以色列的士兵及百姓。

Honeypots are a well known technique for discovering the tools, tactics, and motives of attackers.

密罐是一种用来发现攻击工具,攻击策略与攻击者攻击动机的知名技术。

This is because they were ordered to attack normally, so they fire where the Zone Raiders were as the shot was fired and not at the direction where they are moving.

这是因为它们用的普通攻击,而它们攻击的位置是重装mm原来在的位置,而不是她们移动的位置。

更多网络解释与攻击用的相关的网络解释 [注:此内容来源于网络,仅供参考]

data-driven attack:(数据驱动攻击)依靠隐藏或者封装数据进行的攻击,那些数据可不被察觉

distributed file system 分布式文件系... | data-driven attack(数据驱动攻击)依靠隐藏或者封装数据进行的攻击,那些数据可不被察觉 | DNS spoofing(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DN...

data-driven attack:(数据驱动攻击)依*隐藏或者封装数据进行的攻击,那些数据可不被察觉

distributed file system 分布式文件系... | data-driven attack(数据驱动攻击)依*隐藏或者封装数据进行的攻击,那些数据可不被察觉 | DNS spoofing(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DNS...

Cockatrice:挥击重拳以拳风攻击敌人,同时能将敌人石化

+golen 用金槌攻击,站在地面上的敌人也会受到伤害. | +cockatrice 挥击重拳以拳风攻击敌人,同时能将敌人石化. | +manticore 用毒爪攻击.

Give it a rabbit to chase:先用兔子引它追赶

How do we stop the tank if we get it to commit?|但把坦克引来后,如何应付? | Give it a rabbit to chase.|先用兔子引它追赶 | We could hit the tank in the tracks.|接着攻击坦克的履带

knuckler:用拳套时的攻击

Shoot 用远程攻击武器时的攻击 | Knuckler 用拳套时的攻击 | DF-UP 战斗中增加防御力

mandragora:用蔷薇剑攻击

+serpent 用冰之剑攻击,可以冷冻敌人. | +mandragora 用蔷薇剑攻击. | +golen 用金槌攻击,站在地面上的敌人也会受到伤害.

Pixie Swarm:在身体上下围绕一些发光的小虫,攻击欲近身的敌人

Moonlow----另一种照亮用的魔法 | Pixie Swarm-----在身体上下围绕一些发光的小虫,攻击欲近身的敌人. | Poison----施毒魔法

make a push for sth:(对某事)加把劲, 用最大的努力(做某事);[军]猛烈攻击, 大举进攻

make a push at sth. (对某事)加把劲, 用最大的努力(做某事)... | make a push for sth. (对某事)加把劲, 用最大的努力(做某事);[军]猛烈攻击, 大举进攻 | make a push on sth. (对某事)加把劲, 用最大的努力(做某事)...

make a push at sth:(对某事)加把劲, 用最大的努力(做某事);[军]猛烈攻击, 大举进攻

make a push (对某事)加把劲, 用最大的努力(做某事);[军]猛... | make a push at sth. (对某事)加把劲, 用最大的努力(做某事);[军]猛烈攻击, 大举进攻 | make a push for sth. (对某事)加把劲, 用最大的努力(做某事);[...

DNS spoofing:(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DNS的高速

data-driven attack(数据驱动攻击)依*隐藏或者封装数据进行的攻击,那些数据可不被察觉 | DNS spoofing(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DNS的高速 | eavesdropping 窃听、窃取