IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性。
In order to differentiate incidental attacks and malicious attacks, semi-fragile watermark must be robust against content-protection image processing.
困惑。困惑是嫉羡的结果,好客体被攻击了,不再能够清晰地和坏客体区分开来。
Confusion. Confusion is a result of envy, where the good object is so attacked that it can no longer be clearly distinguished from the bad object.
代表团指责以色列“不加区分的攻击”导致了平民死亡和负伤,并在一些场合上指控以色列蓄意针对民众。
It accuses Israel of "indiscriminate attacks" that resulted in civilian deaths and injuries, and also, on several occasions, of deliberately targeting civilians.
目标威胁评估是目标分配的重要依据,是区分目标的轻重缓急,为多目标攻击决策提供依据的保证。
Targets threat evaluation is the important basis of the target distribution, and guarantees to distinguish the order of importance and urgency, and to provide basis for the decision-making.
那是,攻击者能够区分随机回答从一个真正的答案。
That is, an attacker will be able to distinguish a random answer from a real answer.
同时还采用了聚合篡改区域方法来完成失真检测,能够区分出恶意攻击和一般的图像处理。
This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.
闪电链可攻击4个目标,但伤害削弱。这是为了更好得区分闪电箭和闪电链的作用。
Chain Lightning now jumps to 4 targets but does less damage. We wanted to make the distinction between Lightning Bolt and Chain Lightning more clear.
如果攻击者不能彼此区分两个加密,即使攻击者知道(或已经选择)相应的明文,则密码系统被称为语义安全。
A cryptosystem is called semantically secure if an attacker cannot distinguish two encryptions from each other even if the attacker knows (or has chosen) the corresponding plaintexts.
实验结果表明,该算法能有效抵抗各种常规攻击,区分常规攻击与恶意篡改,并能对恶意篡改进行定位。
Experimental results show that the robust watermark can provide high robustness to conventional attacks, and malicious tampering, it has good accuracy of tamper localization.
实验结果表明,该算法能有效抵抗各种常规攻击,区分常规攻击与恶意篡改,并能对恶意篡改进行定位。
Experimental results show that the robust watermark can provide high robustness to conventional attacks, and malicious tampering, it has good accuracy of tamper localization.
应用推荐