本章也通过例子引入了一个攻击模式的概念。
This chapter also introduces the concept of an attack pattern via examples. This is a novel concept, but the specific patterns in the book invite additional development.
这将无法发现新的,未知的攻击无证攻击模式。
It will not be able to detect new, unknown attacks with undocumented attack patterns.
一旦这样做,开关维京人来攻击模式,所以他们掉到地上。
Once that's done, switch the Vikings to Assault Mode so they drop to the ground.
泥不再追逐的球员在水中时,他们没有在攻击模式。
Slimes no longer chase the player in water when they are not in aggressive mode.
一旦这样做,开关维京人来攻击模式,所以他们掉到地上。
Once that's done, switch the Vikings to Assault Mode so they drop to the ground.
本文主要总结攻击模式的表示方法,并对各种方法进行分析。
The paper summarized the method of attack patterns describing and analysis the method's advantage and disadvantage.
同样地,一只灵能多头蛇蜥每轮也只能发动一次心灵攻击模式。
Likewise, a psionic hydra can only use one attack mode per round.
例如,对一只灵能多头蛇蜥使用心灵攻击模式将对此生物整体造成影响。
For instance, using an attack mode against a psionic hydra affects the creature as a whole.
该算法将已知的攻击模式定义成时间场景模型来处理在线或离线的报警流。
Known attack patterns are defined into temporal scenario models to process online or offline alert flow.
目前多数商业化的入侵检测产品多是采用简单模式匹配技术,只能检测出己知的攻击模式。
Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.
实验表明,该系统对已知攻击模式具有很高的检测率,对未知攻击模式也具有一定的检测能力。
Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.
该文提出了攻击模式的概念,使用基于UML的攻击模式,描述了攻击的静态结构和动态行为。
This paper presents the concept of attack patterns and USES the UML based attack patterns to describe the static structures and dynamic activities of attacks.
星球模式下,它拥有标志性的大颌,外壳可以打开成为攻击模式,在底部有支撑以保证直立状态。
In planet mode it had the trademark clamping jaws, the shell would open up for an attack mode, and also kept itself upright with pegs on the bottom.
惩罚性父母不是一个能以细致入微的方式思考的人,而是一种攻击模式,哪怕是一丁点的故障和错误。
The punitive parent is not a person who is capable of thinking in a nuanced manner, but rather a mode that will attack even the slightest faults and mistakes.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
本文在深入研究系统漏洞和网络攻击模式的基础上,提出与实现了一种面向网络攻击的智能决策支持系统。
This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).
在十周年之际,该全球报告强调了安全团队在防御不断演进的网络犯罪和不断变化的攻击模式时,所面临的挑战和机遇。
On the ten anniversary, the global report highlights the challenges and opportunities faced by the security team in defense of evolving cyber crime and changing attack patterns.
本文首先研究了智能决策支持系统的体系结构、集成方式和知识库设计,然后对系统漏洞和网络攻击模式进行了深入探讨。
This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.
基于海军数据链的突出特点,指出信息化条件下的现代海战中使用海军数据链将对潜艇导弹攻击的过程、对潜指挥方式和导弹攻击模式带来的影响。
Based on the standing out characters of navy data link in modern sea fight, its effect toward submarine missile attacking course, commanding manner and missile attacking pattern are indicated.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
我们的问题是经典的瑞士银行模式也在规章的攻击下。
One problem is that the classic Swiss banking model is also under regulatory attack.
防守模式的分析给永野元帅下了一个死命令:他必须,用防守的方案也好,攻击的方案也好,保证南部防线的安全。
The logic of this defensive pattern imposes on Admiral Nagano an ironclad duty: he must, either by defensive or offensive measures, make the southern arc secure.
另一个研究揭示了当游戏者玩第一人称射击游戏时,大脑活动的模式与攻击行为发生时是一致的。
Another study revealed that gamers had patterns of brain activity consistent with aggression while playing first — person shooter games.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
在几乎是柏拉图理想模式的掩饰范例中,声明中的措辞谴责这起事件(至少确实将此次事件其描述成“攻击事件”),但并未具体将罪责推在任何一方身上。
In an almost Platonically ideal example of fudgery, the wording of the statement condemns the incident (which it does at least identify as an "attack"), but places the blame on nobody in particular.
大多数开发人员听说过关于反模式的一个很好的例子:结构化查询语言(Structured Query Language,SQL)的错误使用导致Web站点受到 SQL 注入攻击。
Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.
大多数开发人员听说过关于反模式的一个很好的例子:结构化查询语言(Structured Query Language,SQL)的错误使用导致Web站点受到 SQL 注入攻击。
Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.
应用推荐