• The factor which influence the attack efficiency of cluster warhead are analyzed.

    分析了影响战斗部攻击效能因素

    youdao

  • The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.

    利用模型可以在两对等实体之间建立高效可靠信任关系有效防止恶意攻击提高P 2 P网络的效率安全

    youdao

  • The ability of detecting efficiency and discovering unknown attack is improved, the security of the system is enhanced, and evaluating the security level of the whole system is availability.

    提高了检测效率发现未知攻击能力增强了系统安全性可以有效整个系统进行安全级别评估

    youdao

  • This framework is able to add new rules for unbeknown attack of IDS, it's also effective to hold back the new attack and improves the manage efficiency.

    联动框架可以有效IDS添加未知攻击规则,并能有效阻断这些新型攻击,提高了管理效率。

    youdao

  • A improved algorithm that builds security channel is provided, the new algorithm not only against known-plaintext attack, but also enhance efficiency of operation for encryption and decryption.

    提出一种改进安全信道建立算法新的算法能够承受已知明文攻击,同时提高加、解密运算效率

    youdao

  • The detection ways of matching attack signature was adopted in Process, its principle is same as most anti-virus software which require high efficiency.

    处理过程中采用攻击特征进行匹配的检测方式实现原理大多数杀毒软件类似,对效率的要求极高。

    youdao

  • For resisting the adaptive chosen message attack and improving the sign generation efficiency, a signature scheme based on the strong RSA assumption is described in this paper.

    为了抵抗适应选择信息攻击提高签名生成效率,提出一种基于rsa假设签名方案

    youdao

  • The results show that swimming with fingers holding together provides higher propulsive efficiency than swimming with fingers splaying at various angles of attack.

    结果表明各个攻角状态下,手并拢划水均能获得更高推进效率

    youdao

  • The experimental results show that the model raises alert processing efficiency and contributes to attack purposes identification and alert accuracy improvement.

    实验表明模型提高报警处理效率识别攻击意图提高报警准确性有较好的效果

    youdao

  • People enjoy the convenience and great efficiency brought by the Internet, at the same time, their computers are continually suffered from many kinds of computer virus and hackers' attack.

    人们充分享受着互联网带来方便高效的同时,不断受到各种计算机病毒感染黑客恶意攻击的侵扰。

    youdao

  • Most current cryptography and session key exchange schemes based on public key are vulnerable to intermediate attack and have low efficiency.

    目前基于公钥加密会话密钥交换方案容易受到中间人攻击且效率不高。

    youdao

  • Experiments show the validness and efficiency of the proposed algorithm, and the strong frangibility to cropping attack, noise attack, and JPEG attack.

    实验证实了该算法有效性剪切攻击噪声攻击、JPEG攻击等具有脆弱性

    youdao

  • Experiments show the validness and efficiency of the proposed algorithm, and the strong frangibility to cropping attack, noise attack, and JPEG attack.

    实验证实了该算法有效性剪切攻击噪声攻击、JPEG攻击等具有脆弱性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定