英语人>网络例句>攻击... 相关的搜索结果
网络例句

攻击...

与 攻击... 相关的网络例句 [注:此内容来源于网络,仅供参考]

A distributed secure clustering protocol is proposed, in which the secure network initialization, random number broadcast from the base station and one-way hash chain are used to achieve the resiliency against possible attacks including node personating, cluster-head occupying, malicious cluster-member recruiting and multiple cluster-membership attacks.

针对成簇协议所面临的各种安全威胁,提出了一种分布式安全成簇协议,通过网络安全初始化、可信基站的随机数广播和单向密钥链技术来有效地抵御节点伪装和簇首占据攻击、簇成员恶意征募攻击和多重簇成员身份攻击。

Methods Relationships between aggressive behaviors and such factors as culture background, occupation, premorbid character, mental symptom features or clinical types were compared and analyzed in 66 schizophrenics with aggressive behaviors and in 92 ones without and intervention measures formulated.

对66例具有攻击行为和92例无攻击行为的精神####症患者的相关文化背景、职业、病前性格、精神症状特点及精神####症临床类型与攻击行为的关系进行对比分析,并提出干预对策。

Once per day, the wielder can reroll a failed attack roll (whether a single attack or one in a series of multiple attacks) as a free action.

每日一次,持用者可以以即时动作重掷失败的攻击骰(无论是单次攻击还是多重攻击中的一次)。

Once per day, thewielder can reroll a failed attack roll (whether a single attack or onein a series of multiple attacks) as a free action.

每日一次,持用者可以以即时动作重掷失败的攻击骰(无论是单次攻击还是多重攻击中的一次)。

Wrong. By attacking the attacker, you are stooping to his level.

对吗?错了。攻击攻击者,你就停留在了攻击者的水平上。

The Honeypot is a strictly moni- tored network decoy,it can distract adversaries from valuable machines on a network,can provide early waming about new attack and exploitation trends,and allow in-depth examination of attacker's action and process during exploitation of a Honeypot.

蜜罐是个受到严密监控的网络诱骗系统,能将攻击从网络中比较重要的机器上转移开,对新攻击发出预警,同时可以在黑客攻击蜜罐期间对其的行为和过程进行深入的分析研究。

The lining form used currently, while the units are still hurt at the same time, makes us feel awkward. Besides, can you add some whisp attacks similar to dragoon, arbiters and Photon Cannon, for too many beam attacks (Nullifier, Colossus, and Void Ray) have bored us a little through the repetitions.

现在所使用的线性攻击很奇怪,明明是直线一个挨一个地打过去,但是被打的单位却同时掉血另外,你们能不能加入一些光球类的攻击,例如龙骑士、仲裁者以及光子炮那样,因为过多的光束性攻击(干扰者、巨像、虚空辉光舰)会使人因为雷同过多而觉得厌烦

If you do this right, in two bashes you will be standing behind your enemy and have a positioning advantage.

当巨力重击触发后,若你站位得当,可以带来不小的优势;通常,当你面对敌方英雄攻击时,你将会将其向敌方塔德方向推送,因此,关键在于一旦触发巨力重击,你要立刻移动到对方的侧面并继续攻击,下次巨力重击触发后,立刻移动到对方的后面并继续攻击,如果你做到这些,那么只需两次重击,你就可以移动到敌方的后面,取得站位优势。

If you do this right, in two bashes you will be standing behind your enemy and have a positioning advantage.

当巨力重击触发后,若你站位得当,可以带来不小滴优势;通常,当你面对敌方英雄攻击时,你将会将其向敌方塔德方向推送,因此,要害在于一旦触发巨力重击,你要马上移动到对方滴侧面并继续攻击,下次巨力重击触发后,马上移动到对方滴后面并继续攻击,假如你做到这些,那么只需两次重击,你就可以移动到敌方滴后面,取得站位优势。

Techniques against information obscurity Disassemble, decompile, or reverse engineering Fault injection – the technique of providing a program input that it does not expect. Fuzzing – the attacker's process of systematically trying various input string that may result in an exploit. Blackmail or buy off insiders. If you want your systems to be more secure, you may want to assume that the attacker knows exactly how the target system works.

用来对付资讯隐匿的技术反组译、反编译、或逆向工程错误注入–提供程式不受预期的输入模糊化–攻击者透过系统化的方式尝试各种输入的组合,其结果可能导致成功的攻击威胁或是收买内部人员如果你希望系统更加安全,你必须假设攻击者针对系统的了解跟你一样深入。

第8/100页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher