• Based on the description of the algorithm, experimental results and attack analysis are given.

    描述算法基础给出实验结果攻击分析

    youdao

  • Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.

    实验结论攻击测试表明算法对JPEG有损压缩滤波附加噪声、剪切各种图像处理的攻击有较强的棒性。

    youdao

  • The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.

    实验结果表明水印算法具有良好的抗JPEG压缩旋转裁剪常见攻击的能力。

    youdao

  • So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.

    因此对于工作中得出的相关数据分析结果非常感兴趣,这些数据最近发表赛门铁克关于攻击工具恶意站点的报告中

    youdao

  • During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.

    经过分析获取了目前使用最广泛的两种攻击工具以下它们进行简短说明

    youdao

  • This is the first time that scientists have done a systematic analysis of how genes can influence the effect of coffee on heart attack risk.

    报道说,科学家首次基因如何影响咖啡心脏病发作危险作用进行系统分析研究

    youdao

  • From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.

    嗅探、分析一直管理员发出可能出现入侵的警报,Snort能够保护工作成果,使之免受攻击。

    youdao

  • A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.

    一种统计方法主要用于研究高能物理股市波动,现在有可能人类对抗艾滋病战役中开辟新的战场。

    youdao

  • In this analysis, 143 participants who took calcium had a heart attack, compared with 111 who took a placebo.

    分析表明,服用钙片导致心脏病的有143名参与者,相较而言,服用安慰剂而导致心脏病的只有111名。

    youdao

  • The virus could attack the analysis by exhausting the patience of such an analyser.

    病毒就可能通过消磨此类分析器耐性攻击分析

    youdao

  • An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.

    形式分析承诺这个小节中讨论一个攻击分析阶段例子

    youdao

  • Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文。

    youdao

  • A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.

    文中结合实验结果增强剪切攻击鲁棒性的技术进行分析

    youdao

  • To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.

    进一步提高密码芯片安全性,密码芯片必须防止简单能量分析差分能量分析的攻击

    youdao

  • Analysis and evaluates the characteristics of typical attack scenarios from the aspects of the possibility, ability of concealment, release rate and harmfulness of the possible attacks.

    袭击发生可能性隐蔽性、生化制剂释放速度危害性四个方面典型生化袭击场景特性进行了分析评价

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • Then, using packet capture mechanism to attack the data collection, analysis and recording.

    然后利用数据包捕获机制攻击数据进行收集分析记录

    youdao

  • The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.

    扩展诚实理想分析模型不仅继承了理论有关性质而且适应猜测攻击分析

    youdao

  • This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.

    本文首先冗余事件关联特征进行系统分析包括攻击类型关联特征、空间关联特征、时间关联特征。

    youdao

  • Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.

    全面分析攻击方案基础上,构造了一种增强代理多重签名方案。

    youdao

  • Based on abduction inference, a method of network attack process analysis for incident response was designed.

    针对事后入侵响应,提出了一种基于引理推理攻击过程分析方法

    youdao

  • The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.

    安全性分析表明方案能够防止明文攻击合谋攻击伪造攻击。

    youdao

  • GSK had already submitted its own pooled analysis to the FDA, which suggested that short-term use of rosiglitazone might increase the risk of heart attack by some 30-40%.

    GSK已经FDA提交了他们自己混合分析认为短期服用罗格列酮可能增加30 - 40%心脏病发作的危险

    youdao

  • In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.

    论文信息隐藏方面主要工作就是围绕两种应用展开,内容涉及图像乱、图像信息隐藏隐藏分析和攻击技术等方面。

    youdao

  • The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.

    网络攻击行为频度复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们关注

    youdao

  • The honeypot took as one kind of new security tool in the attack examination, the analysis, the research, has the superior performance in particular to the unknown attack capture aspect.

    蜜罐作为新的安全工具攻击检测分析研究尤其是未知攻击的捕捉方面有着优越性能

    youdao

  • The honeypot took as one kind of new security tool in the attack examination, the analysis, the research, has the superior performance in particular to the unknown attack capture aspect.

    蜜罐作为新的安全工具攻击检测分析研究尤其是未知攻击的捕捉方面有着优越性能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定