确定攻击成功而导致安全性被破坏的可能性。
Determine the potential for damage from a successful attack that results in a security breach.
攻击成功后,离心机运转速度失控,直至瘫痪。
Attack is successful, centrifuges operating speed out of control, until the paralysis.
该系统使得攻击有自动性和智能性,提高了攻击成功的可能性。
This model system makes the attack have automaticity and intelligence, which enhances the possibility of success attack.
法院要决定专利是否应该保护,有效攻击成功的时间等相关问题。
Courts have grappled with the relevant issues in determining whether or not a patent should be protected and when an attack on validity should be successful.
这种模型使得攻击非常难以预测和防范,并大大提高了攻击成功的可能性。
This model makes it hard to predict and prevent attack behaviors, and enhances the possibility of success attack.
每次攻击过后,科学家们都要记录下精确的地理位置和水深,以及攻击成功与否。
After each attack, the scientists recorded the precise geographical location and the depth of the water, as well as whether the attack was successful or not.
当编码规则按等概率分布选取时,计算出各种攻击成功的概率并在特殊情况下得到一组完备码。
Assuming the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.
在详细研究攻击实例的基础上,从攻击成功的根本原因出发,提出了一种新的重放攻击分类方法。
This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
与其攻击成功的美国公司,欧洲的领导人应该问他们自己,为什么他们的大陆没有一个像谷歌或脸谱一样的公司。
Instead of attacking successful American companies, Europe's leaders should ask themselves why their continent has not produced a Google or a Facebook.
若要将因攻击成功而导致的损害降到最低,请为您的代码选择安全上下文,以便只向资源授予其完成工作所必需的访问权限。
To minimize the amount of damage that can occur if an attack succeeds, choose a security context for your code that grants access only to the resources it needs to get its work done and no more.
其它攻击者向有效的AT M添加硬件,实施相同的攻击并取得了成功。
Other attackers have added hardware to valid ATMs to apply the same attacks with real success.
这个成功攻击的效果,就是当在用户浏览器上执行该页面时,会显示一个弹出窗口,如图4中所示。
The effect of this successful attack, which when executed on the user browser will cause a popup window to be displayed, is demonstrated in Figure 4.
然而,只有在银行自身脆弱的时候,这种攻击才会成功。
Yet, such an attack can only be successful if Banks are vulnerable.
在今年早些时候的德州州长竞选中,受欢迎的共和党现任州长瑞克·派瑞就成功攻击他的初选对手凯•贝利·哈钦森惦记联邦的钱。
In the governor's race in Texas earlier this year Rick Perry, the popular Republican incumbent, successfully attacked Kay Bailey Hutchison, his opponent in the primary, for chasing federal money.
使用“不可预知的”或者“惟一的”文件名也没有用,因为攻击者可以反复猜测该文件名,直到成功为止。
Using an unpredictable or unique file name doesn't work by itself because an attacker can repeatedly guess until success.
混合攻击将数字和符号添加到文件名以成功破解密码。
A hybrid attack will add numbers or symbols to the filename to successfully crack a password.
然而,最近这种有效市场理论遭到了行为模型学说攻击。该学说成功的用极具说服力的理由击中对方软肋。
Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.
攻击没有完全成功:根据国际核查人员的报告,伊朗一些运行中的部件减速后停止,其他的幸存下来。
The attacks were not fully successful: Some parts of Iran's operations ground to a halt, while others survived, according to the reports of international nuclear inspectors.
配备MMSP的“宙斯盾”SPY - 1雷达跟踪了这架飞机,并成功执行了所有的攻击方案。
The Aegis SPY-1 radar, equipped with MMSP, tracked the aircraft and successfully executed all attack scenarios.
这一章回顾了基本的实践,不仅包括减少成功攻击的机率,也包括当攻击不可避免时,很快地作出反应。
This chapter reviews essential practices not only to decrease the odds of a successful attack, but also to respond quickly when an attack inevitably succeeds.
无论您的站点或应用程序有多出色,只要未得到周全的保护,即便是相当成功的,也会成为攻击的目标。
No matter how great your sites and applications are, if they're not secured, and they're even mildly successful, those sites are targets.
本部分讨论了您如何机智地减少成功攻击的机率,以及当您面对成功攻击时如何作出反应。
This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.
首先,虚拟化的本质就决定了存在攻击者从一个虚拟环境中成功逃脱的可能性。
First, the possibility that an attacker might success-fully escape from a virtualized environment lies in virtualization's very nature.
在马来西亚,一个“中规中矩”,穆世林占多数的国家,似乎没有任何成功有对个人展开不公正攻击来的快。
In Malaysia, a prudish, majority-Muslim country, it seems that nothing succeeds quite like below-the-belt personal attacks.
手动的攻击是非常艰苦的,并且只有当攻击者知道关于购物者某些信息的时候才能成功。
Manual attacks are laborious, and only successful if the attacker knows something about the shopper.
不过俄罗斯及中国谴责其将此作为一个借口,好证明自个也有本事,进行一次成功的反卫星攻击。
But it was accused by Russia and China of using this as an excuse to demonstrate that it, too, could carry out a successful anti-satellite strike.
即使猎物拥有很好的感知系统,注意到了食肉动物正在靠近,夜间攻击的成功率也可能比白天攻击的成功率高。
Even if the prey had a good sensory system to notice a predator closing in, the success rate of a nocturnal attack may be higher than a diurnal attack.
与IPv 4类似,在漏洞被成功利用时,会受到攻击。
Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.
与IPv 4类似,在漏洞被成功利用时,会受到攻击。
Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.
应用推荐