英语人>网络例句>攻击... 相关的搜索结果
网络例句

攻击...

与 攻击... 相关的网络例句 [注:此内容来源于网络,仅供参考]

Evaluating the damage efficiency of the carrier plane groups under the attacking of multiple-submunition is a complicated problem. A rapid method was provided to evaluate the damage efficiency issue based on vulnerability analysis of the carrier plane group and using the pixel-simulation method, and a computation simulation model of the carrier plane groups under the attacking of submunition was established.

对于采用子母弹攻击航空母舰舰载机群的毁伤效果分析问题,存在相当大的难度,为对子母弹攻击舰载机群毁伤评估提供一个快速、初步的结果,在对舰载机群进行易损性分析的基础上,采用像素仿真的模拟方法,实现了多弹攻击下舰载机群毁伤效果的计算机模拟计算。

Paraphrase: He revealed an important reality that had long been ignored, for which he suffered insults from biased and close-minded people everywhere; mainly through his hard work, he was able to see during his lifetime that his discovery was indisputably recognized by other scientists, readily accepted by common people, and only rejected by those who wanted to condemn but were not courageous enough to do so.

他发现了深藏在我们脚下的、被偏邪之人攻击、被全世界嘲笑的真理;他活着的时候看到了这一真理,主要通过他自己的努力,无可争议地在科学中占有了一席之地,并成为普通人思想中不可分割的一部分,只被那些想攻击却又不敢攻击的人憎恶和恐惧。

Attacking with a Conjuration:'''If you can attack with a conjuration, you make the attack.

以咒法物攻击:'''若你能经由咒法物攻击,攻击由你发动。

Another resynchronization attack is also proposed, which is the combination of the differential cryptanalysis and algebraic attack.

利用差分分析和代数攻击提出了另一种新型的再同步攻击方法,并利用此攻击方法分析了LILI-128 密码体制。

One atttack to SQL infuse: The SQL parameter that the inquiry parameter in moving easy system to use pair of SQL to inquire a statement undertakes filtering; uses type security changes inquiry way, from go up at all the type of problem;URL parameter that solves SQL infuse, amount, limits limits a function, the problem that solves baleful user to be atttacked through address column ill will, these mediums control SQL infuse, still include other a few filter processing, will prevent SQL infuse attack with the to user data-in test and verify of other.

一对于SQL注入攻击:动易系统采用对SQL查询语句中的查询参数进行过滤;使用类型安全的SQL参数化查询方式,从根本上解决SQL注入的问题;URL参数类型、数量、范围限制功能,解决恶意用户通过地址栏恶意攻击的问题等,这些手段是控制SQL注入的,还包括其它的一些过滤处理,和其它的对用户输入数据的验证来防止SQL注入攻击。

In the paper, we will assort the VoIP-related assailments by attack tree, and also forge the communications between users and attackers by using Honeypot to collect the information of the despiteful attackers.

本文中参考目前常见之VoIP相关的攻击手法,利用攻击树的架构做为分类,试著完整的表现出各种针对VoIP的攻击。

Arrive from the enterprise government, more and more origanization construction regard individual and organization as to be opposite internally gregarious network diplomatic shedding and collective channel.

利用ActiveX控件进行攻击是最常见的攻击手段,根据赛门铁克的数据,仅去年上半年,就发现了210个ActiveX漏洞,这是IE成为常见攻击目标的主要原因。

The proposed scheme is secure against multisignature collusion attack, adaptive chosen-ID attack and forgeability under chosen-message attack.

拟议的计划是安全的对多重共谋攻击,自适应选择-编号攻击和锻造下,选择消息攻击。

Gaia : This Golden Fleece has the power to deflect approaching weapons and thrust them back to those who deliver them.

盖亚 :金羊毛护臂有抵挡攻击并且把攻击反弹给攻击你的人的功能。

Now when one unit attacks another from higher ground, the fog of war surrounding the higher units no longer automatically revealed, meaning the unit at the lower position can't return fire.

现在当一个单位在高地攻击另外的一个单位,攻击单位上的战争迷雾将不会自动消除(在星际中则会把单位暴露出来),意味着在下面的被攻击的单位将不能还击!

第5/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher