• 别的数学家用比较粗鲁的语言攻击分析方法

    Other mathematicians attacked analytic methods in harsher language.

    youdao

  • 描述算法基础给出实验结果攻击分析

    Based on the description of the algorithm, experimental results and attack analysis are given.

    youdao

  • 数字水印研究主要分为算法设计攻击分析两个方面。

    The research for digital watermarking is mainly divided into two branches, i. e. embedding techniques and attacking methods.

    youdao

  • 通过BAN逻辑及各种可能攻击分析证明协议安全的。

    On the analysis of BAN-logic and some possible attacks, the protocol is secure.

    youdao

  • 心理分析学家采用心理动力学治疗方法专家,他们认为攻击冲动发泄行为一种“情绪宣泄”。

    Psychoanalysts, therapists adopting a psychodynamic approach, refer to the venting of aggressive impulses as "catharsis".

    youdao

  • 动态分析工作方法黑客攻击一个应用程序所使用方法十分相似

    Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application.

    youdao

  • 因此对于工作中得出的相关数据分析结果非常感兴趣,这些数据最近发表赛门铁克关于攻击工具恶意站点报告中

    So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.

    youdao

  • 分析攻击多个方面

    Analyze the various points of attack.

    youdao

  • 经过分析获取了目前使用最广泛的两种攻击工具以下它们进行简短说明

    During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.

    youdao

  • 有一种分析认为,小金必须通过下令攻击南韩来树立威信,就象父亲当初建立信誉方式一样。

    One line of analysis is that the younger Kim has to put a few notches in his belt by ordering some attacks on the South, the way his father once built up a little credibility.

    youdao

  • 多数分析员对此不予重视.直接攻击安全部队转向策划自杀性爆炸事件小规模埋伏行动或许就是游击队组织势力相对较一个标志

    The group’s switch from direct attacks on the security forces to suicide bombings and small-scale ambushes may be a sign of relative weakness.

    youdao

  • 难道就任由无人飞行器仅仅依据数据分析发动攻击吗?

    Does it follow that an unmanned aircraft should be allowed to fire a weapon based entirely on its own data analysis?

    youdao

  • 持续产业监测分析整个组织状态使用网络终端传感器发现目标攻击行为。

    Ongoing estate monitoring: analyses behaviour across an organisation's estate using network and endpoint sensors to discover targeted attacks.

    youdao

  • 编辑数据验证——为了去除跨站点脚本SQL注入攻击HDIV分析所有的可编辑数据域

    Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.

    youdao

  • 针对一系列攻击ModSecurityweb应用提供了强大的保护HTTP流量进行监测实时分析这些都只是很少或是根本没有影响系统的基础设施

    ModSecurity provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.

    youdao

  • 嗅探、分析一直管理员发出可能出现入侵的警报,Snort能够保护工作成果,使之免受攻击

    From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.

    youdao

  • 大多数计算机安全分析没有提及针对Twitter具体攻击来源

    Most computer security analysts did not cite a specific source of the attack on Twitter.

    youdao

  • 不久前CraigslistSpam攻击引发了博客热烈反响,博客界开始分析牛皮癣们的技术寻找可行的治疗方案,思考牛皮癣的蔓延对架构的潜在影响

    The recent spam attack on Craigslist triggered many reactions in the blogosphere seeking to analyze spammerstechniques and implications of the spam’s spread.

    youdao

  • 然后攻击能够通过分析记录数据检索出凭证信息比如说密码凭证信息。

    The attacker can then analyze the recorded data to retrieve confidential information, such as passwords and confidential messages.

    youdao

  • 大多数紧急问题发现由于动态分析是作为一个黑客测试这个应用程序的,因此它会找出攻击者所发现十分相似问题。

    Discovery of the most critical issues: Since dynamic analysis tests the application as a hacker would, it finds the issues most likely to be discovered by attackers.

    youdao

  • 随着攻击进化会有工具辅助代码分析,代码分析提供信息帮助找到存在漏洞的代码

    As these attacks evolve there will be tools to assist with code analysis that will give information to help you find the lines of code where the vulnerabilities exist.

    youdao

  • 一些东欧分析认为俄国没有攻击意图,也不打算支持那些敌视西方国家重启冷战相反莫斯科宁愿开发西方的财富技术

    Some East European analysts say Russia doesn't want to attack or allow hostile relations with the West a la cold war; Rather, Moscow's intent is to exploit the riches and technology of the West.

    youdao

  • 许多分析人士辩论专家一致认为,候选人面对面的辩论中向对手发起人身攻击有风险的。

    Many analysts and debate experts also agree that it is risky for a candidate to launch personal attacks against an opponent in a face-to-face debate format.

    youdao

  • 分析人士表示就增加了黑客对准富人攻击几率。

    According to analysts, it raises the prospect of hackers targeting wealthy individuals.

    youdao

  • 分析人士表示就增加了黑客对准富人攻击几率。

    According to analysts, it raises the prospect of hackers targeting wealthy individuals.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定