• 攻击技术一些特点

    Some characteristics of attack techniques.

    youdao

  • 图像水印算法设计攻击技术互相促进对立面

    The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    youdao

  • 缓冲区溢出攻击技术一项十分有效的网络攻击技术

    Buffer overflow attack technology is a very efficient attack technology based on network.

    youdao

  • 网络隐蔽通道技术一种被广泛应用网络攻击技术

    Network covert channel has been widely used for network attack.

    youdao

  • 攻击技术比赛攻击以旋为主攻击为辅

    Attack skill: The main attack was turning kick in competition. The auxiliary attacks were back kick and front kick.

    youdao

  • 论文MD5算法攻击技术进行深入分析研究。

    Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.

    youdao

  • 本文介绍木马攻击原理、常用攻击技术以及防范策略

    This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    youdao

  • 攻击浪费了他们时间糟糕的是,揭示了他们的攻击技术

    The attacker has wasted their time and, worse, revealed their attack techniques.

    youdao

  • 主要方式网上教授病毒木马制作技术各种网络攻击技术

    Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    youdao

  • 此外,结 合可能细微先验知识限制提出了有限攻击技术

    The limited blind interference technology is presented in terms of no subtle priori knowledge.

    youdao

  • 为了提高检测技术检测设备水平首先攻击技术非常深入的了解

    In order to improve the level of detection technology and testing equipment, we must first have a deep understanding of the attack technology.

    youdao

  • 信息安全防护一个博弈过程黑客攻击技术魔高一尺,防护技术就道高一丈。

    Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.

    youdao

  • 这里我们对僵尸网络,普遍攻击技术以及涉及到的个人一个更贴近观察

    In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    youdao

  • 为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    youdao

  • 该文提出了基于木马漏洞扫描模型攻击原理以及关键攻击技术实现作了进一步研究

    This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.

    youdao

  • 首先智能卡安全攻击主要方法进行了研究,分析了几种最新的智能卡攻击技术原理关键步骤

    At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.

    youdao

  • 信息安全核心技术在于攻防”,即攻击技术防御技术只有掌握攻击技术才能更好做到安全防御。

    The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    youdao

  • 攻击技术涉及到、左刺拳、左钩拳上钩拳、右交叉以及组合拳,1 - 2连击的组合拳

    Punching involves quite a few skills, such as the straight left, the left jab, the left hook, the right uppercut, the right cross as well as the combination punching like the one-two.

    youdao

  • 入侵检测信息安全领域一个挑战性课题,其中重要的原因是入侵检测所面临是极富智慧攻击技术

    Intrusion detection is a real challenge in the area of information security. The reason is that it faces the most intelligent hackers.

    youdao

  • 论文信息隐藏方面主要工作就是围绕两种应用展开,内容涉及图像乱、图像信息隐藏隐藏分析和攻击技术等方面。

    In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.

    youdao

  • 这种技术不同之处是既有攻击有说服力。

    There's something different about this technology: it is both invasive and persuasive.

    youdao

  • 自然而然披上杀死技术”的铠甲准备这个混蛋发起嘹亮难以理解攻击

    I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.

    youdao

  • 但是可以运用以下技术防止ARP攻击

    But you can help prevent ARP attacks using the following techniques.

    youdao

  • 有一个女人曾经使用类似MITM攻击技术抢劫很多的很多(请参阅参考资料)。

    A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).

    youdao

  • 了解了密码破解者如何在内部外部使用技术攻击基础结构

    You also saw how password crackers use techniques both internally and externally to your infrastructure.

    youdao

  • 了解了密码破解者如何在内部外部使用技术攻击基础结构

    You also saw how password crackers use techniques both internally and externally to your infrastructure.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定