此外还分析了当对嵌有水印的作品进行穷举搜索攻击和减法攻击时算法的鲁棒性。
Moreover we analyze its robustness when exhaustive search and subtraction attack are inflicted on the watermarked content.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
蠕虫与病毒已经试图利用搜索引擎建立准备攻击的潜在牺牲者的列表。
Worms and viruses have attempted to use the search engine to create lists of potentially vulnerable victims to attack.
网站的访问量收到了绊倒安全机制,让人觉得这个搜索引擎在受到一个垃圾邮件程序的攻击。
The volume of searches the site received tripped safety mechanisms and made the search engine think it was under attack from a spambot.
响应搜索关键字的搜索引擎也容易遭受这类攻击。
Search engines that echo the search keyword that was entered are also vulnerable to such attacks.
状告HTC可能只是拐着弯攻击Google的办法,但一旦有效的话,对这个搜索巨人也会是有力一击。
Suing HTC may be a roundabout way to attack Google, but if successful, it would be a powerful blow against the search giant.
中国最大的搜索引擎百度昨日遭遇自1999年成立以来最严重的攻击,4小时后才恢复正常。
Baidu, China's largest Internet search engine, was the target of a four-hour cyber attack yesterday, the most severe since it was established in 1999.
而根据veracode的Wysopal所说,搜索“gets ”函数——一个臭名昭著的不安全字符串操作——可以揭示很可能易受内存溢出攻击的程序。
And, searching for the function "gets" — a notoriously insecure string operation — can reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.
于是他们在Google上做一次搜索,发现了这些网站并用相同的方法一次攻击50个网站。
So they'd do a Google search, find those sites and then hack all 50 sites using the same method.
佐治亚理工学院信息安全中心一份新的报告把搜索引擎、移动电话和个人信息列为黑客攻击的首要目标。
A new Georgia Tech information Security Center report cites search engines, mobile phones and personal information as prime targets for hackers.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
攻击直升飞机指定为直- 9w (Z - 9w),特征是一对外部挂架和一套顶部安装瞄准具用于昼间目标搜索和跟踪。
The attack helicopter, designated Zhi-9W (Z-9W), features a pair of external weapon pylon and a roof-mounted optical sight for target searching and tracking in daylight.
60将为美海军提供各种需要的运输能力,无论是两栖运输、攻击、搜索救援还是战地垂直补给。
From amphibious and combat search and rescue to battlegroup vertical replenishment, the CH-60 will deliver all the advanced capabilities the Navy needs.
目标制导的反向验证方法使用反向推理机制,能够缩小攻击路径的搜索空间,有利于提高效率。
The target-driven reversing verification method uses the mechanism of reverse reasoning, and reduces the searching space of attacking trace, meaning high efficiency.
建立了搜索收益、再识别收益、攻击收益和毁伤评估收益的计算公式。
Calculation formulas of search benefit, re-identify benefit, attack benefit and battle damage assessment benefit were constructed.
谷歌说,将不再过滤Google .cn网站的搜索结果,原因是北京方面加大了对言论的限制以及一系列针对谷歌等外国企业的网络攻击。
Google, citing Beijing's tightening limits on expression and a series of cyber attacks on it and other foreign companies, said it would no longer filter search results on the site.
探测攻击可使用由应用程序生成的错误消息来搜索安全漏洞。
A probing attack can use error messages generated by an application to search for security vulnerabilities.
为实现重选目标和攻击移动目标,研究了低可观测飞行器飞行过程,考虑战术巡逻因素,对移动目标实时搜索模型进行了改进; 建立了指挥系统与低可观测飞行器信息铰链模型,并进行了软件仿真。
In order to re-aim a new target and attack a moving target, the model of real-time searching for moving target was improved by considering the factors of tactical cruising of the aircraft.
当你在某处战斗的时候,努力用剩下的搜索者攻击矿车。
When you are battling elsewhere, try to attack Harvesters with your left over Seekers.
如果一个攻击者搜索一个网络中的薄弱幻剑并使用了这些由一个蜜罐提供的服务,蜜罐就会将其转向并发出警报。
If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.
采用解析法建立了攻击机目标搜索模型;分析了对比度和能见距离对发现概率的影响。
Analytic method was used to build up a target searching model for the attacker, and the effect of contrast and visible distance on detection probability was analyzed.
雌性成蜂易于低温保存,对寄主有较强的搜索力和攻击力。
The female wasps could be stored under low temperature safely without influence on their host-searching and host-attacking abilities.
雌性成蜂易于低温保存,对寄主有较强的搜索力和攻击力。
The female wasps could be stored under low temperature safely without influence on their host-searching and host-attacking abilities.
应用推荐