• 我们假设攻击成功地一个包含恶意脚本页面到订阅成员使用的网站上。

    Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.

    youdao

  • 如果使用静态方法应该确保攻击能够糟糕的事情不会使得预先的假设无效而且检查最终结果也是一个主意。

    If you're using a static approach, you should ensure that the worst an attacker could do won't invalidate some assumption, and a few checks on the final result would be a good idea too.

    youdao

  • 最早遭受破坏仍旧普遍攻击来源于开发人员最终用户输入数据可以信任假设

    Some of earliest to be perpetrated, and still prevalent, attacks rely on a developer's assuming that data entered by the end user can be trusted.

    youdao

  • 这种假设增加溢出攻击

    This assumption gives rise to the overflow family of attacks.

    youdao

  • 服务器假设Request - Token头部中缺乏正确任何请求都是CSRF攻击企图拒绝它们。

    The server will assume that any requests that lack the correct value in the Request-Token header are CSRF attack attempts and will reject them.

    youdao

  • CSRF攻击依赖这样一个服务器假设来自启动验证会话浏览器所有请求都是有效的。

    CSRF attacks depend on a server assuming that all requests transmitted from the browser that originally started an authenticated session are valid.

    youdao

  • 知道一点,假设攻击构造了一条IC MP回应消息中包含伪造任意主机a地址192.168.2.2

    Knowing this, imagine that an attacker constructs an ICMP echo message containing the spoofed source address of some arbitrary Host a, such as 192.168.2.2, in its header.

    youdao

  • 假设是基于抽烟能削弱肺部功能或者免疫力,更可能两者,从而使人们容易受到疾病攻击

    The presumption has been that smoking renders people vulnerable to disease by impairing lung function or immunity. And it may well do both.

    youdao

  • 使xml格式抵制模糊攻击关键特征一个输入不做任何假设解析器

    The key characteristic that makes XML formats resistant to fuzz is that an XML parser assumes nothing about the input.

    youdao

  • ,“如果这样假设设定广,有许多平民百姓就成为合法攻击目标。”

    "If you are interpreting this concept too widely, far too many civilians become lawful targets," Kellenberger said.

    youdao

  • 可怜的假设天真编码、加上强烈动机的攻击使得危险随之而来

    Poor assumptions, naive coding, and a motivated attacker make dangerous bed fellows.

    youdao

  • 假设一个攻击利用WeatherReporter应用程序弱点

    Suppose I'm an attacker wishing to exploit weaknesses in the Weather Reporter application.

    youdao

  • 现在假设攻击发送了超过buffer 1所处理数据

    Now imagine that an attacker has sent more data than buffer1 can handle.

    youdao

  • 我们进一步假设主机a位于网络192.168.2.0并且攻击数据报发送这个网络网络广播地址而不是某台特定主机。

    Let's further assume that host a is located in network 192.168.2.0, and that the attacker sends the datagram to the network broadcast address of this network instead of to a particular host.

    youdao

  • 假设存在大量设施(Eucalyptus声称其客户超过25000个),那我们真的怀疑能否短期修复台服务器攻击

    Assuming a large number of installations (according to Eucalyptus there are more than 25,000 customers), we are doubtful that this attack will be mended on each server within a short period of time.

    youdao

  • 假设花费了4个小时来战翻一个Boss,过程中你必须在准确把握攻击时间同时避开火焰巨石攻击

    Say you spend four hours fighting a boss where you have to perfectly time your attacks while dodging flame and giant rock fists.

    youdao

  • 假设别人的攻击并非出自恶意,而是源自野心

    Assume that offenses do not stem from malice, but rather from ambition.

    youdao

  • 分析高级随机包标记算法(AMS)基础上提出种基于反向确认的攻击源追踪模型,模型不再需要AMS假设前提

    On the basis of analysis about advanced marking scheme (AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS.

    youdao

  • 我们假设系统受到冲击波攻击

    Let us assume that your system by the shock wave of attacks.

    youdao

  • 假设你们言语上攻击西方人的话,你们小心太伤害我们的“脸面”吗?

    However suppose you guys wanted to verbally attack the western people, would you be careful enough not to hurt our "faces" too harsh?

    youdao

  • 此外,证明方案加密算法DDH假设适应性选择密文攻击安全的。

    The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.

    youdao

  • 提出了数据分析特征滤波器假设检验融合决策等过程组成隐藏攻击方法

    In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.

    youdao

  • 为了抵抗适应选择信息攻击提高签名生成效率提出一种基于rsa假设签名方案

    For resisting the adaptive chosen message attack and improving the sign generation efficiency, a signature scheme based on the strong RSA assumption is described in this paper.

    youdao

  • 高密度随机背包困难性假设,可以证明方案在唯密文攻击安全的。

    Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    youdao

  • 水平特权升级要求攻击使用相同水平已经授予权限假设另一个用户身份权限。

    Horizontal privilege escalation requires the attacker to use the same level of privileges he already has been granted, but assume the identity of another user with similar privileges.

    youdao

  • 提出一种新的指定证实签名方案自适应方式攻击的安全性依靠合理安全假设

    Then, we present a new designated confirmer signature scheme, whose security against adaptive adversaries is proven to depend on reasonable security assumptions.

    youdao

  • 合理参数设置复杂性假设方案具有接近于RS A签字的复杂性,并可能抗击量子敌手攻击

    Under rational complexity assumptions and security parameters, the scheme enjoys the same computation cost as that of rsa signature but plausible security against quantum adversaries.

    youdao

  • 合理参数设置复杂性假设方案具有接近于RS A签字的复杂性,并可能抗击量子敌手攻击

    Under rational complexity assumptions and security parameters, the scheme enjoys the same computation cost as that of rsa signature but plausible security against quantum adversaries.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定