别的数学家用比较粗鲁的语言攻击分析方法。
Other mathematicians attacked analytic methods in harsher language.
在描述算法的基础上,给出了实验结果及攻击分析。
Based on the description of the algorithm, experimental results and attack analysis are given.
数字水印研究主要分为算法设计和攻击分析两个方面。
The research for digital watermarking is mainly divided into two branches, i. e. embedding techniques and attacking methods.
通过BAN逻辑及各种可能的攻击分析,证明协议是安全的。
On the analysis of BAN-logic and some possible attacks, the protocol is secure.
心理分析学家是采用心理动力学治疗方法的专家,他们认为攻击性冲动的发泄行为是一种“情绪宣泄”。
Psychoanalysts, therapists adopting a psychodynamic approach, refer to the venting of aggressive impulses as "catharsis".
动态分析工作的方法与黑客在攻击一个应用程序时所使用的方法十分相似。
Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
分析攻击的多个方面。
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
有一种分析认为,小金必须通过下令攻击南韩来树立威信,就象他父亲当初建立信誉的方式一样。
One line of analysis is that the younger Kim has to put a few notches in his belt by ordering some attacks on the South, the way his father once built up a little credibility.
多数分析员对此不予重视.从直接攻击安全部队转向策划自杀性爆炸事件和小规模埋伏行动或许就是游击队组织势力相对较弱的一个标志。
The group’s switch from direct attacks on the security forces to suicide bombings and small-scale ambushes may be a sign of relative weakness.
难道就任由无人飞行器仅仅依据其数据分析就发动攻击吗?
Does it follow that an unmanned aircraft should be allowed to fire a weapon based entirely on its own data analysis?
持续产业监测:分析整个组织状态,使用网络和终端传感器发现目标攻击行为。
Ongoing estate monitoring: analyses behaviour across an organisation's estate using network and endpoint sensors to discover targeted attacks.
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.
针对一系列的攻击,ModSecurity为web应用提供了强大的保护,并对HTTP流量进行监测和实时分析,这些都只是很少或是根本没有影响系统的基础设施。
ModSecurity provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
大多数计算机安全分析都没有提及针对Twitter的具体攻击来源。
Most computer security analysts did not cite a specific source of the attack on Twitter.
不久前对Craigslist的Spam攻击引发了博客届的热烈反响,博客界开始分析牛皮癣们的技术,寻找可行的治疗方案,思考牛皮癣的蔓延对架构的潜在影响。
The recent spam attack on Craigslist triggered many reactions in the blogosphere seeking to analyze spammers’ techniques and implications of the spam’s spread.
然后,攻击者能够通过分析记录数据检索出凭证信息,比如说密码和凭证信息。
The attacker can then analyze the recorded data to retrieve confidential information, such as passwords and confidential messages.
大多数紧急问题的发现:由于动态分析是作为一个黑客来测试这个应用程序的,因此它会找出与攻击者所发现十分相似的问题。
Discovery of the most critical issues: Since dynamic analysis tests the application as a hacker would, it finds the issues most likely to be discovered by attackers.
随着攻击的进化,将会有工具辅助代码分析,代码分析可提供信息以帮助您找到存在漏洞的代码行。
As these attacks evolve there will be tools to assist with code analysis that will give information to help you find the lines of code where the vulnerabilities exist.
一些东欧分析家认为俄国并没有攻击性的意图,也不打算支持那些敌视西方的国家重启冷战;相反,莫斯科宁愿开发西方的财富和技术。
Some East European analysts say Russia doesn't want to attack or allow hostile relations with the West a la cold war; Rather, Moscow's intent is to exploit the riches and technology of the West.
许多分析人士和辩论专家也一致认为,候选人在面对面的辩论中向对手发起人身攻击是有风险的。
Many analysts and debate experts also agree that it is risky for a candidate to launch personal attacks against an opponent in a face-to-face debate format.
据分析人士表示,这就增加了黑客对准富人攻击的几率。
According to analysts, it raises the prospect of hackers targeting wealthy individuals.
据分析人士表示,这就增加了黑客对准富人攻击的几率。
According to analysts, it raises the prospect of hackers targeting wealthy individuals.
应用推荐