• 此外分析了当对有水印的作品进行穷举搜索攻击减法攻击算法的鲁棒性

    Moreover we analyze its robustness when exhaustive search and subtraction attack are inflicted on the watermarked content.

    youdao

  • 字典攻击——根据字典词汇,使用搜索方式推测一个有效用户密码

    Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.

    youdao

  • 蠕虫病毒已经试图利用搜索引擎建立准备攻击潜在牺牲者列表

    Worms and viruses have attempted to use the search engine to create lists of potentially vulnerable victims to attack.

    youdao

  • 网站访问量收到了绊倒安全机制觉得这个搜索引擎在受到一个垃圾邮件程序的攻击

    The volume of searches the site received tripped safety mechanisms and made the search engine think it was under attack from a spambot.

    youdao

  • 响应搜索关键字搜索引擎容易遭受攻击

    Search engines that echo the search keyword that was entered are also vulnerable to such attacks.

    youdao

  • 状告HTC可能只是拐攻击Google办法一旦有效的话这个搜索巨人有力一击

    Suing HTC may be a roundabout way to attack Google, but if successful, it would be a powerful blow against the search giant.

    youdao

  • 中国最大搜索引擎百度昨日遭遇1999年成立以来严重攻击,4小时后才恢复正常。

    Baidu, China's largest Internet search engine, was the target of a four-hour cyber attack yesterday, the most severe since it was established in 1999.

    youdao

  • 根据veracodeWysopal所说,搜索gets函数——一个臭名昭著不安全字符串操作——可以揭示可能内存溢出攻击程序

    And, searching for the function "gets" — a notoriously insecure string operationcan reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.

    youdao

  • 于是他们在Google上搜索发现这些网站并用相同方法一次攻击50个网站。

    So they'd do a Google search, find those sites and then hack all 50 sites using the same method.

    youdao

  • 佐治亚理工学院信息安全中心一份新的报告搜索引擎移动电话个人信息列为黑客攻击的首要目标

    A new Georgia Tech information Security Center report cites search engines, mobile phones and personal information as prime targets for hackers.

    youdao

  • 恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    youdao

  • 攻击直升飞机指定为直- 9w (Z - 9w),特征一对外部挂架套顶部安装瞄准用于昼间目标搜索跟踪

    The attack helicopter, designated Zhi-9W (Z-9W), features a pair of external weapon pylon and a roof-mounted optical sight for target searching and tracking in daylight.

    youdao

  • 60为美海军提供各种需要运输能力,无论是两栖运输、攻击搜索救援还是战地垂直补给

    From amphibious and combat search and rescue to battlegroup vertical replenishment, the CH-60 will deliver all the advanced capabilities the Navy needs.

    youdao

  • 目标制导反向验证方法使用反向推理机制,能够缩小攻击路径搜索空间,有利于提高效率。

    The target-driven reversing verification method uses the mechanism of reverse reasoning, and reduces the searching space of attacking trace, meaning high efficiency.

    youdao

  • 建立搜索收益、再识别收益、攻击收益毁伤评估收益计算公式

    Calculation formulas of search benefit, re-identify benefit, attack benefit and battle damage assessment benefit were constructed.

    youdao

  • 谷歌不再过滤Google .cn网站搜索结果,原因是北京方面加大了言论限制以及一系列针对谷歌外国企业网络攻击

    Google, citing Beijing's tightening limits on expression and a series of cyber attacks on it and other foreign companies, said it would no longer filter search results on the site.

    youdao

  • 探测攻击使用应用程序生成错误消息搜索安全漏洞

    A probing attack can use error messages generated by an application to search for security vulnerabilities.

    youdao

  • 实现重选目标攻击移动目标,研究了低可观测飞行器飞行过程,考虑战术巡逻因素移动目标实时搜索模型进行了改进; 建立了指挥系统与低可观测飞行器信息铰链模型,并进行了软件仿真。

    In order to re-aim a new target and attack a moving target, the model of real-time searching for moving target was improved by considering the factors of tactical cruising of the aircraft.

    youdao

  • 某处战斗的时候,努力剩下搜索攻击矿车

    When you are battling elsewhere, try to attack Harvesters with your left over Seekers.

    youdao

  • 如果攻击搜索网络中的薄弱幻剑使用这些一个蜜罐提供服务,蜜罐就会其转向并发出警报。

    If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.

    youdao

  • 采用解析建立攻击目标搜索模型分析了对比度能见距离发现概率影响

    Analytic method was used to build up a target searching model for the attacker, and the effect of contrast and visible distance on detection probability was analyzed.

    youdao

  • 雌性易于低温保存寄主有较强的搜索攻击

    The female wasps could be stored under low temperature safely without influence on their host-searching and host-attacking abilities.

    youdao

  • 雌性易于低温保存寄主有较强的搜索攻击

    The female wasps could be stored under low temperature safely without influence on their host-searching and host-attacking abilities.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定