查询词典 sneak attack
- 与 sneak attack 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.
建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
The lurk's sneak attack can damage constructs,if sneak attack damage would otherwise apply on the lurk's attack(for instance,if the construct is flanked or flat-footed).
如果偷袭伤害适用于被潜伏者攻击的目标(例如,该构装体处于被夹击状态,或措手不及状态),则潜伏者的偷袭可伤害构装体。
-
We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.
本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。
-
Thus, flanking opponents gain no bonus on their attack rolls instead of +2, and rogues are denied their sneak arrack because you do not lose your bonus to Dexterity (but they may still sneak attack you if you are caught flat-footed).
因此,夹击你的敌人在攻击检定上并无+2加值,由于你并未失去对AC的敏捷加值,游荡者也不能偷袭你(但他们在你措手不及时仍可偷袭你)。
-
The lurk's sneak attack can damage undead creatures,if sneak attack damage would otherwise apply on the lurk's attackfor instance,if the undead is flanked or flat-footed
如果偷袭伤害适用于被潜伏者攻击的目标(例如,该不死生物处于被夹击状态,或措手不及状态),则潜伏者的偷袭可伤害不死生物
-
1605 Antiaircraft Artillery Regiment, 4 Bomber Aircraft Corps (202, 219, 321 Bomber Aircraft Division), 5 Ground Attack Aircraft Corps (4 Guards, 264 Ground Attack Aircraft Division), 8 Ground Attack Aircraft Corps (224, 227 Ground Attack Aircraft Division), 5 Fighter Aircraft Corps (8 Guards, 256 Fighter Aircraft Division), 10 Fighter Aircraft Corps (10 Guards, 235 Fighter Aircraft Division), 10 Guards Ground Attack Aircraft Division, 331 Fighter Aircraft Division, 208 Night Bomber Aircraft Division, 98 Guards, 50 Recon Aircraft Regiment, 372, 1002 Separate Artillery Regiment
第1254﹑1554﹑1555﹑1605防空炮团,第4轰炸机军(第202﹑219﹑321轰炸机师),第5强击机军(第4近卫强击机师,第264强击机师),第8强击机军(第224﹑227强击机师),第5歼击机军(第8近卫歼击机师,第256歼击机师),第10歼击机军(第10近卫歼击机师,第235歼击机师),第10近卫强击机师,第331歼击机师,第208夜间轰炸机师,第98近卫侦察机团,第50侦察机团,第372﹑1002独立炮兵团
-
Supply contact group, were positive,, mountain hafnium, butt Qi, Wang main parts such as automatic lathes, table lathes have, belts, steam-driven chuck Block, Grinding, open closed claw, Tool,òsmall motors, clutches, cam blanks, chuck, drilling chuck, cam, cam Events, cam thimble, tools, wheel discs, retaining materials arm, S plate, rolling round silk flower attack, attack left tooth wire, drill bits, L-drill, round bars, tungsten steel round bars, die, plate braces, dental regulation, cone, non-ditch attack silk, silk YAMAWA attack Japan, Japan OSG silk attack.
供应洽群、名阳、昌勇、山铪、錡夆、王主等自动车床零配件,有桌上车床、皮带、汽动夹头座、磨刀机、开闭爪、车刀、打油小马达,离合器、凸轮毛胚、夹头、钻尾夹头、凸轮、活动凸轮、凸轮顶针、车刀、砂轮碟,挡料臂、S型板、滚花轮丝攻,左牙丝攻、钻头、左旋钻头、圆棒,钨钢圆棒、板牙、板牙套、牙规、牙轮、无沟丝攻、日本YAMAWA丝攻、日本OSG丝攻。
-
Due to the limitation of attack effects on NASL scripts, we add new attack program description functions and attack property functions into the engine in order to extend NASL script. Then we use the extended NASL to give unification description to attack scripts and attack programs.
针对NASL脚本在攻击效果上的局限性,在NASL脚本引擎中,添加了攻击程序描述函数,以及攻击工具特征属性函数,完成了对NASL脚本语言的扩展,实现了攻击脚本与攻击程序的统一脚本化描述。
-
First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given.
首先介绍攻击仿真的测试目标和内容,并提出了攻击仿真系统和仿真平台的设计和实现的详细方案;同时,在此基础上,对该平台的设计和实现的3个关键技术:测试数据的选择、攻击技术的分类研究、攻击测试域及其划分等进行了进一步的分析,最后给出并分析了实验测试结果。
- 相关中文对照歌词
- Atak Of Da Bal-Hedz
- Attack
- Heart Attack
- Heart Attack
- Mr. Universe
- Attack
- Heart Attack
- Heart Attack Man
- Heart Attack
- Penguin Attack
- 推荐网络例句
-
A major factor in deviation from optimal performance of the activated sludge secondary clarifier is the presence of density currents,resulting from the density difference and temperature difference.
异重流的形成是影响活性污泥系统二沉池水力学性能的主要因素,形成异重流的主要原因包括沉淀池内不均匀的污泥分布和温度分布。
-
You always nip it in the bud.
你总是有办法解决的。
-
Posterior vomer mucoperiosteal flap was designed by dissecting the posterior vomer, and then each side of PVMF was sutured with the same side mucosal flap and the levator veli palatini. Result: This method was applied in 55 cases with satisfactory results of extending and elevating soft palate, and achieving velopharyngeal closure.
55例先天性Ⅱ、Ⅲ度腭裂患者犁骨后缘正中纵向剖开,分别形成两犁骨后缘犁骨粘膜瓣,将腭帆提肌止点连同同部位软腭鼻腔侧粘膜一起缝合于犁骨后缘犁骨粘膜瓣顶点上,上提后推软腭,再缝合口腔侧粘膜。