英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

While some honeypots are used to divert the attention of attackers from legitimate systems, the purpose of a honeynet is to learn the tools and tactics of the black-hat community.

一些&蜜罐&是用来分散攻击攻击真正主机的注意力,另外一些是用来学习攻击者所使用的工具和策略的,我们这里所提到是属于后者。

So while it might be devastating with a buffed attack, its seemingly random linear pattern could lead to frustration at high levels of play...even moreso with a longer cooldown.

所以虽然他的攻击很容易摧毁敌方部队,但是它的随机攻击类型还是导致它极难操作。而且它的攻击间隔还是加长了。

The defenders that have been pressing on them are also looing back.

攻击他们的守军也在回望,当沉寂的时间已经远超过常规弹的引爆时间时,侥幸心理就暗示他们这是一发臭弹,攻击他们的人从地上爬起来回归攻击位置,几个人走向那处洞孔试图往里打量。

Methods 56 schizophrenics with and 143 ones without aggressive behaviors were studied with the BPRS, EPQ and MOAS.

对56例有攻击行为者和143例无攻击行为者进行对照研究,应用BPRS、EPQ、外显攻击行为等量表进行评定。

Methods The schizophrenic patients were recruited according to DSM-IV, and 99 of them whose total weighted score of the Modified Overt Aggression Scale≥4 were the violent subjects, 102 of them whose total weighted score of the MOAS≤0 were the control subjects.

采用《修订版外显攻击行为量表》对符合美国精神障碍诊断与统计手册第4版的精神分裂症患者进行评定,99例MOAS加权总分≥4分者纳入有攻击行为组,102例MOAS加权总分0分者为无攻击行为组。

Aggressive behavior was measured with MOAS, 24 schizophrenic patients with aggressive behavior and 17 schizophrenic patients without aggressive behavior and 25 normal persons were examined with event-related potentials P300, SEP and ABR, t test and one-way ANOVA were used to inspect factors that may have an influence for aggression in schizophrenics.

用MOAS评定攻击行为,然后使用美国Nicolet Spirit脑诱发电位仪,对24例分裂症伴攻击行为患者和17例分裂症无攻击行为患者及25例正常人的事件相关电位P300,脑诱发电位SEP和ABR进行对照研究。

In each other's territory, the attention is not a neutral zone, you can not attack each other's first and only other attack you only when they can fight back, but why did you attack them then??

在对方领地里,注意不是中立区,你不可以先攻击对方,只有对方攻击你时才可以还击,而且你为什么要攻击他们呢??

Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks.

通过检测那些授权滥用的内部攻击和外部攻击,不但可以提供信息损坏的评估,而且还能免于受到以后的攻击

I remember taking up a hoko-like position (a guarding posture in ninjutsu designed to create a protective 'bubble' that is difficult for the attacker to get through) to cover against the incoming attacks and having to simultaneously deal with an officer who thought that I was the one doing the attacking!

记得有一回了法光样位置(A护卫姿势ninjutsu旨在创造一种保护'泡沫',是很难攻击打通),以支付对来袭攻击,并同时处理人员以为我是第一个这样的攻击

For 4-pass HAVAL, we describe a practical attack for finding two-block collisions with 2~(36) computations. Using the more complex message modification technique, the complexity can be improved to 2~(30). In addition, we show that collisions for 5-pass HAVAL can be found with about 2~(123) computations, which is the first attack more efficient than the birthday attack.

对于4-PassHAVAL,首次给出了一个复杂度为2~(36)的具有两个消息分组的碰撞,使用更复杂的消息修改技术,该攻击的复杂度能够降低到2~(30);对于5-pass HAVAL,首次给出了一种优于生日攻击的理论攻击方法,复杂度小于2~(123)。

第10/100页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher