英语人>网络例句>攻击 相关的搜索结果
网络例句

攻击

与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]

Assault: A violent physical or verbal attack.

攻击,抨击:武力或口头上的攻击

ABSTRACTOR :With the hacker of technology and hacker tool promotion , cause a large number of enterprise , organization , personal computer system suffer degree different invasion and attack, or face the danger attacked at any time.

字数:31557 页数:61 毕业论文带程序)摘要:黑客技术的提升和黑客工具的泛滥,造成大量的企业、机构和个人的电脑系统遭受程度不同的入侵和攻击,或面临随时被攻击的危险。

The SD-8 Accipiter is a flying Sentry Drone with assault capabilities, armed with an optical tracker and multi-barrel rotating cannons.

SD-8 "猎鹰"攻击机器人通过小队的NetBat系统锁定和攻击敌人,具有光学跟踪器和多管旋转式机炮。

Protocol analysis technology resolve several main problems: accurateness, capability, service, integration with other security system.

它是新一代IDS系统探测攻击手法的主要技术,它利用网络协议的高度规则性快速探测攻击的存在,因而它与具体的协议格式息息相关。

And the second logical fallacy is the ad hominem attack

的对手。而第二个是人身攻击-攻击那发表理论的人而不是合理性地讨论问

We transplant and improve the NASL script engine, utilize the improved engine to call attack scripts and attack programs.

同时,对NASL脚本引擎进行了移植和改造,利用改进的脚本引擎,实现攻击脚本与攻击程序的统一调用,在此基础上设计了基于扩展NASL脚本的攻击工具箱。

The toolkit makes use of plug-in technology, gives unification description and management to the attack tools and utilizes improved NASL engine to call them.

该工具箱利用脚本插件技术,在对攻击工具进行统一描述的基础上,实现攻击工具统一管理;利用改进后的NASL脚本引擎,实现攻击工具的统一调用。

Due to the limitation of attack effects on NASL scripts, we extend the NASL script language and use the extended NASL to give unification description to attack tools.

针对NASL脚本在攻击效果上的局限性,本文对NASL脚本语言进行了扩展,利用扩展的NASL脚本,实现攻击脚本与攻击程序的统一描述。

Especially after a series of impossible differential attacks on AES has been published, it is now considered to be one of the most effective cryptanalytic methods on AES.

尤其是近年来对AES的攻击,得到了一系列非常好的攻击结果,使得不可能差分分析已成为对AES最有效的攻击方法之一。

The corresponding color weighted diagraph was setup in dependence on the inference relation of the security holes in the intruded machine. With the vulnerability-log relation matrix, we searched different forensic information source and got the corresponding support value which could help to prune the false relation between the nodes and get the remote suspicious host. Then analyzing the suspicious host in the same way.

以漏洞间推理关系为前提,从受害主机入手,构造有色加权有向图,在多日志中查找漏洞被利用的解释信息,并由查找结果对漏洞链动态剪枝,得到主机漏洞攻击链和攻击该受害主机的嫌疑主机,对嫌疑主机迭代分析,推理出网络漏洞攻击链。

第11/100页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher