• 确定攻击成功导致安全性被破坏可能性

    Determine the potential for damage from a successful attack that results in a security breach.

    youdao

  • 攻击成功离心机运转速度失控直至瘫痪

    Attack is successful, centrifuges operating speed out of control, until the paralysis.

    youdao

  • 系统使得攻击自动性智能性提高攻击成功可能性

    This model system makes the attack have automaticity and intelligence, which enhances the possibility of success attack.

    youdao

  • 法院决定专利是否应该保护有效攻击成功时间相关问题

    Courts have grappled with the relevant issues in determining whether or not a patent should be protected and when an attack on validity should be successful.

    youdao

  • 这种模型使得攻击非常难以预测防范大大提高攻击成功可能性

    This model makes it hard to predict and prevent attack behaviors, and enhances the possibility of success attack.

    youdao

  • 每次攻击过后科学家们都要记录精确地理位置水深,以及攻击成功与否。

    After each attack, the scientists recorded the precise geographical location and the depth of the water, as well as whether the attack was successful or not.

    youdao

  • 编码规则概率分布选取时计算各种攻击成功概率特殊情况下得到一组完备码。

    Assuming the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.

    youdao

  • 详细研究攻击实例基础上,从攻击成功的根本原因出发,提出一种新的重放攻击分类方法

    This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols.

    youdao

  • 文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    youdao

  • 与其攻击成功美国公司欧洲领导人应该他们自己为什么他们大陆没有一个谷歌脸谱一样的公司。

    Instead of attacking successful American companies, Europe's leaders should ask themselves why their continent has not produced a Google or a Facebook.

    youdao

  • 要将因攻击成功导致损害降到最低,请代码选择安全上下文以便资源授予完成工作所必需的访问权限

    To minimize the amount of damage that can occur if an attack succeeds, choose a security context for your code that grants access only to the resources it needs to get its work done and no more.

    youdao

  • 其它攻击有效AT M添加硬件实施相同攻击取得成功

    Other attackers have added hardware to valid ATMs to apply the same attacks with real success.

    youdao

  • 这个成功攻击效果就是用户浏览器执行页面时,会显示一个弹出窗口如图4中所示。

    The effect of this successful attack, which when executed on the user browser will cause a popup window to be displayed, is demonstrated in Figure 4.

    youdao

  • 然而只有在银行自身脆弱的时候,这种攻击成功

    Yet, such an attack can only be successful if Banks are vulnerable.

    youdao

  • 今年早些时候德州州长竞选受欢迎共和党现任州长克·派瑞就成功攻击初选对手贝利·哈钦森惦记联邦

    In the governor's race in Texas earlier this year Rick Perry, the popular Republican incumbent, successfully attacked Kay Bailey Hutchison, his opponent in the primary, for chasing federal money.

    youdao

  • 使用不可预知的”或者“惟一的”文件名没有用因为攻击可以反复猜测该文件名,直到成功为止。

    Using an unpredictable or unique file name doesn't work by itself because an attacker can repeatedly guess until success.

    youdao

  • 混合攻击数字符号添加文件名成功破解密码

    A hybrid attack will add numbers or symbols to the filename to successfully crack a password.

    youdao

  • 然而最近这种有效市场理论遭到行为模型学说攻击学说成功极具说服力的理由击中对方软

    Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.

    youdao

  • 攻击没有完全成功根据国际核查人员报告伊朗一些运行中的部件减速后停止其他幸存下来

    The attacks were not fully successful: Some parts of Iran's operations ground to a halt, while others survived, according to the reports of international nuclear inspectors.

    youdao

  • 配备MMSP的“宙斯盾SPY - 1雷达跟踪了架飞机成功执行了所有攻击方案

    The Aegis SPY-1 radar, equipped with MMSP, tracked the aircraft and successfully executed all attack scenarios.

    youdao

  • 一章回顾了基本实践不仅包括减少成功攻击机率包括攻击不可避免时,很快地作出反应。

    This chapter reviews essential practices not only to decrease the odds of a successful attack, but also to respond quickly when an attack inevitably succeeds.

    youdao

  • 无论站点应用程序出色只要得到周全的保护即便是相当成功会成为攻击目标

    No matter how great your sites and applications are, if they're not secured, and they're even mildly successful, those sites are targets.

    youdao

  • 部分讨论了如何机智地减少成功攻击机率以及您面对成功攻击时如何作出反应。

    This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.

    youdao

  • 首先虚拟化本质就决定了存在攻击一个虚拟环境成功逃脱可能性

    First, the possibility that an attacker might success-fully escape from a virtualized environment lies in virtualization's very nature.

    youdao

  • 马来西亚一个中规中矩”,穆世林占多数的国家似乎没有任何成功有对个人展开不公正攻击来的快。

    In Malaysia, a prudish, majority-Muslim country, it seems that nothing succeeds quite like below-the-belt personal attacks.

    youdao

  • 手动攻击非常艰苦的,并且只有攻击知道关于购物者某些信息的时候才能成功

    Manual attacks are laborious, and only successful if the attacker knows something about the shopper.

    youdao

  • 不过俄罗斯中国谴责作为借口,好证明自个有本事,进行成功的反卫星攻击

    But it was accused by Russia and China of using this as an excuse to demonstrate that it, too, could carry out a successful anti-satellite strike.

    youdao

  • 即使猎物拥有好的感知系统注意到了食肉动物正在靠近夜间攻击成功可能白天攻击成功

    Even if the prey had a good sensory system to notice a predator closing in, the success rate of a nocturnal attack may be higher than a diurnal attack.

    youdao

  • IPv 4类似,在漏洞成功利用,会受到攻击

    Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.

    youdao

  • IPv 4类似,在漏洞成功利用,会受到攻击

    Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定