• 第三章中我们首先详细介绍了水印去除攻击密钥攻击协议攻击

    In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.

    youdao

  • 本文提出了一个面向测试协议攻击描述模型以及相应协议攻击测试算法。

    A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.

    youdao

  • 提出安全的数字水印方案方案能够比较有效抵抗现有已知几种协议攻击

    A new secure watermarking scheme is proposed, which resists efficiently the current known watermarking protocol attacks.

    youdao

  • 通过这些概念理论角度研究分析可以协议攻击对策的研究作一些新的指导

    The research and analysis of these concepts in theoretic angle may give rise to some new instructions for the research of attacks and countermeasures.

    youdao

  • 通过网络截获系统调用截获器,各种各样协议攻击操作系统攻击和应用程序攻击进行防范。

    By using network interceptor and system call interceptor, it resists all kinds of protocol attacks, operation system attacks and application attacks.

    youdao

  • 文章分析ARP协议工作原理安全缺陷攻击原理攻击方式基础,详细论述基于ARP协议攻击的防御方法

    This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.

    youdao

  • 他因协议上签了字而受到攻击

    He was attacked for having put his signature to the deal.

    《牛津词典》

  • 临时停火协议不能防止以后发生报复性攻击可能性

    The temporary cease-fire agreement does not preclude possible retaliatory attacks later.

    youdao

  • 以下几节中找到关于ICMPTCP详细的信息以及一些使用这些协议的有趣的攻击

    In the following sections you will find more detailed information about ICMP and TCP as well as some interesting attacks using these protocols.

    youdao

  • 需要使用前面介绍针对不同攻击类型其他监视类型以及配置确保服务级协议兼容性

    Other types of monitoring for the types of attacks mentioned above are also needed, as well as configurations to ensure compliance with service-level agreements.

    youdao

  • 协议用于提供安全信息(比如用户凭证交易信息)机密性,还提供了防止中间人攻击保护

    This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.

    youdao

  • 尽管将不在本文介绍任何IP级别攻击,但我确实需要稍微详细地讨论IP,因为ICMPTCP底层协议

    While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.

    youdao

  • 随着建国方案实现的可能性减少,阿巴斯先生承受越来越尖刻口头攻击1993年与以色列领导共同签订《奥斯陆协议》后,就把自己诚信了两方案身上。

    As the prospect of statehood has receded, there have been harsher verbal attacks on Mr Abbas, who has staked his credibility on a two-state deal ever since he co-drafted the Oslo accords in 1993.

    youdao

  • 意味着任何使用这些浏览器的用户容易遭到针对TLS 1.0协议网络攻击

    This means that anyone using them might be vulnerable to a TLS 1.0 attack.

    youdao

  • 关键的问题入侵者是使用定义良好的API协议来进行攻击的。

    The key is that the attack is executed using well-defined APIs and protocols.

    youdao

  • 时间以后两个被隔离的路由器重新连接并发自己的边界网关协议更新信息一旦攻击开始,其会使它们再次断开

    A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more.

    youdao

  • 根据协议俄罗斯2017年放弃其在乌克兰克里米亚海军基地,在该地区一旦有事,西北风级两栖攻击舰就可以投入使用。

    The Mistrals could matter in any conflict over Crimea in Ukraine, where Russia is due to give up a naval base in 2017.

    youdao

  • IP协议簇本身的缺陷导致别有用心者构造现今互联网众多攻击的原因。

    It is TCP/IP protocol family defects that cause some ulterior persons to make up numerous attacks on Internet.

    youdao

  • 一个IPS系统可以监控异常行为发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet地址解析协议欺骗攻击

    An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.

    youdao

  • 这个改变引入一些索引允许重传队列中的元素进行随机访问,这个改变对于解决TCP协议find - first攻击问题重要

    A change that introduces some sort of index that allows access to random elements of the large retransmission queue is critical to address the find-first attacks against the TCP stack.

    youdao

  • 大部分真的是指大部分,据报道攻击大量聚集目标需要CIA预先通知巴基斯坦当局,根据双方协议,若一次攻击超过20个人的目标则需要提前通知巴基斯坦的盟友

    And bulk really means bulk. The Journal reports that the growth in clusters of people targeted by the CIA has required the agency to tell its Pakistani counterparts about mass attacks.

    youdao

  • 功能监测网络协议攻击

    It has the function to monitor a network and to protocol attacks.

    youdao

  • 参加2009年的哥本哈根气候变化峰会之后,国内受到了攻击因为人们觉得我努力促成一份有约束力全球协议做得太多太少

    After attending the 2009 Copenhagen summit on climate change, I was attacked back home for either doing too much or too little in trying to bring about a binding global agreement.

    youdao

  • 针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合攻击检测模型(GADM)。

    To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    youdao

  • 安全协议进行猜测攻击如果攻击不能正确猜测用户秘密那么他就会设法使用其他信息验证这种猜测

    A guessing attack on a security protocol is an attack where an attacker guesses a chosen user's secret and if failed then seeks to verify that guess by using other information.

    youdao

  • 一个安全认证协议有效抵御恶意攻击通信网进行欺诈保证通信网的安全运行。

    A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.

    youdao

  • 引入一种新类型攻击称为协议猜测攻击可以存在于混合协议中。

    In this paper it introduced new types of attacks called multi-protocol guessing attacks, which can exist when protocols are mixed.

    youdao

  • 第三章介绍网络协议基础常见攻击方法原理入侵检测系统规范标准

    Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.

    youdao

  • 第三章介绍网络协议基础常见攻击方法原理入侵检测系统规范标准

    Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定