This prevents cross-site scripting, a nasty attack method.
这可以防止跨站点脚本,一个令人讨厌的攻击方法。
One especially invasive attack method in the arena of 'psycho-electronic' mind control is' voice to skull '.
在精神电子型的精神控制方法中,最具攻击性的袭击方法是把声音传入头骨。
The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.
第三部分,应用推广的构造攻击方法指导密码协议的设计。
An efficient attack method against AES is presented with a detail example, which is called Differential Fault Analysis.
介绍了目前针对AES的有效的一种攻击方法:差分容错攻击,并给出了完整的攻击实例来加以说明。
We organize the paper as below: The first chapter introduces the concept, definition, application and some attack method of watermarking.
本文的内容主要安排如下:第一章系统地论述了数字水印的历史、概念、应用、原理,以及攻击方法和性能评估等。
A correlation attack method on combiners is presented, which is based on multi-linear correlations between the inputs and outputs of combiners.
研究了对非线性组合生成器进行相关攻击时的整体策略,提出了最优恢复顺序的概念。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
Internet worm attacks, as a typical attack method of the Internet, with a wide range of attacks and difficult to remove, recently drew a high degree of attention.
网络蠕虫作为一种典型的互联网攻击手段,具有攻击范围广、破坏力强并且难于清除的特点,近来已受到了高度的关注。
The new attack method can Simulated company level: some malicious advertising activities using the proxy (or gateway) as the middle manager, cover up malicious activities.
全新攻击方法可模拟公司层级:某些恶意广告活动使用代理(或“网关”)作为中间管理者,掩盖恶意活动。
Aiming at Advanced Encryption Standard (AES) implemented on a secret chip, this paper presents an optical fault injection attack method to get the secret information from microcontroller.
为获取芯片的秘密信息,针对其中的高级加密标准(aes)算法,提出一种光故障注入攻击方法。
Requiring little target's information, the passive radar concealed attack of antiship missiles in an important attack method today, while it is very difficult to get targets' information.
反舰导弹的纯方位发射对目标信息要求不高,在目标信息的探测越来越艰难的今天,是反舰导弹较为重要的一种发射方式,也将会成为未来海战场上常用的作战方式。
The safety of this protocol is based on the elliptic curve discrete logarithm of non-supersingular elliptic curve over finite field, on which there has been no efficient attack method up to now.
协议的安全性是建立在目前尚未存在有效攻击方法的有限域上非超奇异椭圆曲线的椭圆曲线离散对数问题之上的。
The best method of reducing attack on the cellulose and still obtain a bleachable pulp is to use strong acid and low cooking temperature.
生产纤维损失小、漂白性能好的浆料的最佳方法是使用强酸和低蒸煮温度。
This method removes the potential for an SQL injection attack.
这种方法消除了SQL注入攻击的可能性。
Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.
黑客可以根据所收集的信息推断出可能的弱点,并选择对选定目标系统的最佳攻击方法。
This is a common method of waging a denial of service attack.
这就是黑客进行“拒绝服务”攻击的常见手法。
The impact of any terrorist CBRN attack would depend heavily on the success of the chosen method of dissemination and the weather conditions at the time of the attack.
任何CBRN袭击的影响,都严重依赖于在袭击时选择成功的散播方式和气候条件。
Incident investigation: investigates ongoing attacks, identifying the method and extent of attack, the vulnerabilities exploited and the information targeted.
故障调查:调查正在进行的攻击,确定攻击的方法和范围、攻击漏洞和针对性的目标信息。
In the Sundarbans region of Bangladesh, people wear masks on the back of their heads (pictured above) to prevent an assault from behind - the tiger's preferred method of attack.
在孟加拉的孙德尔本斯地区(the Sundarbans regionof Bangladesh),人们在后脑勺戴上一个面具(如上图),来防止来自背后的袭击——这是老虎最喜欢的攻击方式。
Put forward the defense method that some to these attack stone.
提出了一些对这些攻击的防御方法。
In this paper, the method of reentry maneuver guidance applying to attack the ground fixed target is described by using flight dynamics principle and modern control theory.
本文运用飞行力学原理和现代控制理论,对攻击地面固定目标的飞行器的再入机动制导方法进行了研究。
The research, published in the international academic journal Injury Prevention, is the first ever to compare injuries by method of attack.
这项研究刊登在国际学术刊物《伤害预防》上,是有史以来的第一个研究攻击的方法与伤害的程度。
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
The malware that led to the hacking of security giant RSA may have been a "zero-day attack" – ie, it had never been seen before – but the method of infection was nothing new.
恶意软件导致安全巨人RSA公司遭到“zero-day attack”攻击(指系统有缺陷,被黑客抓住而发起的攻击)--通过IE,以前没有发生过这种事--但是攻击的技术却是老套。
Yes, I can attack the whole class with a far superior method than the particular one because I was earlier embedded in needless detail.
是的,我能够用更高级的方法解决整类问题而不是一个特定问题,那是因为我以前深入研究了“不必要”的细节。
This method resolves the problem of threat assessment and threat sorting to the enemy air attack targets efficiently.
该方法有效地解决了对敌空中目标威胁评估与排序问题。
Experiments show that the method has a fine ability to stand against the synchronization attack, such as random cropping.
实验结果证明,该方法具有良好的抗同步攻击的能力。
For prevent and attack money laundering, we must to learn the method of money laundering.
为了更好地打击和预防洗钱犯罪,有必要了解犯罪分子采用的洗钱方法。
A new attack classification method was put forward and delivered the criterion and results of the classification.
提出了一种新的基于多维角度的攻击分类方法,给出分类的标准和结果。
A new attack classification method was put forward and delivered the criterion and results of the classification.
提出了一种新的基于多维角度的攻击分类方法,给出分类的标准和结果。
应用推荐