英语人>网络例句>攻击者 相关的搜索结果
网络例句

攻击者

与 攻击者 相关的网络例句 [注:此内容来源于网络,仅供参考]

IRAG model deals well with the attack's intent and alternation of strategies, and takes account of incentives of system and attacker across-the-board.

该模型较好地解决了攻击意图及策略变化的问题,并全面考虑了系统、攻击者的收益等因素。

System incentive and alternation of attacker's strategies are not taken into full consideration in current intrusion response research. An intrusion response model (intrusion response based on attack graph, IRAG) based on the attack graph is proposed to solve this problem.

针对当前入侵响应工作中存在的不能充分考虑系统的收益,以及不能充分考虑攻击者策略变化因素等问题,提出了一种基于攻击图的入侵响应IRAG(intrusion response based on attack graph)模型。

This may potentially allow attackers to preform a cross site scripting attack.

这样会潜在的让攻击者构造一个跨站脚本攻击。

But with the increasing maturity of Cracker and the increasing attack means, pure firewall strategy cant satisfy the requests. And at the same time, the net environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling leak.

而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂多样,单纯的防火墙策略已经无法满足对安全高度敏感的部门的需要,网络的防卫必须采用一种纵深的、多样的手段。

But with the increasing maturity of Cracker and the increasing attack means, pure firewall strategy cant satisfy the requests. At the same time, the network environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling leak.

而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂多样,单纯的防火墙策略已经无法满足对安全高度敏感的部门的需要,网络的防卫必须采用一种纵深的、多样的手段。

A silk moth caterpillar comes with a false head, complete with mock antennae, to lure predators into biting its rear. Plan B: If the ruse fails, extra spines on the real head may prompt the attacker to spit out its prey still intact.

蚕蛾毛虫就有一个假头,甚至长有假触角,在天敌攻击时诱惑对方咬它的后部。B计划是:一旦措施不奏效,它们真正头部的刺便会迫使攻击者马上将它们吐出,从而避免伤害。

Discussion is made on the intrusion detection system,including two sets of systems with the models and operating process.

随着计算机网络的发展,计算机网络安全作为一个无法回避的问题呈现在人们面前,而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂,入侵检测系统作为一种重要检测手段应运而生。

The initial attack is followed by a takedown, with the attacker generally staying in contact with the broken limb to maintain leverage on the target.

初次攻击后紧接着将对手摔倒,攻击者一般仍保持着与对手折断肢体的接触,以保持对目标的杠杆作用。

You can't really prevent dictionary and guessing attacks, nothing prevents an attacker to just try all possible keys and look if the database decrypts.

你不能真正防止字典攻击和猜测,没有什么能够阻止攻击者试图将所有可能的密钥,并期待如果数据库解密。

With requests, but flooding attacks can often be defused at the network layer.

攻击者可以通过大量的发送请求给应用程序,对合法用户拒绝服务,但是淹没式的攻击常常在网络层被拒绝。

第4/42页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。