• 通过例子引入了一个攻击模式概念

    This chapter also introduces the concept of an attack pattern via examples. This is a novel concept, but the specific patterns in the book invite additional development.

    youdao

  • 无法发现新的未知攻击攻击模式

    It will not be able to detect new, unknown attacks with undocumented attack patterns.

    youdao

  • 一旦这样做,开关维京人攻击模式,所以他们地上

    Once that's done, switch the Vikings to Assault Mode so they drop to the ground.

    youdao

  • 不再追逐球员水中时,他们没有攻击模式

    Slimes no longer chase the player in water when they are not in aggressive mode.

    youdao

  • 一旦这样做,开关维京人攻击模式所以他们地上

    Once that's done, switch the Vikings to Assault Mode so they drop to the ground.

    youdao

  • 本文主要总结攻击模式表示方法对各种方法进行分析

    The paper summarized the method of attack patterns describing and analysis the method's advantage and disadvantage.

    youdao

  • 同样地多头蛇蜥只能发动次心灵攻击模式

    Likewise, a psionic hydra can only use one attack mode per round.

    youdao

  • 例如能多头蛇使用心灵攻击模式将对此生物整体造成影响

    For instance, using an attack mode against a psionic hydra affects the creature as a whole.

    youdao

  • 该算法将已知攻击模式定义时间场景模型处理在线离线报警

    Known attack patterns are defined into temporal scenario models to process online or offline alert flow.

    youdao

  • 目前多数商业化入侵检测产品多是采用简单模式匹配技术只能检测己知攻击模式

    Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.

    youdao

  • 实验表明系统已知攻击模式具有很高检测对未知攻击模式具有一定检测能力。

    Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.

    youdao

  • 该文提出了攻击模式概念使用基于UML攻击模式描述攻击静态结构动态行为

    This paper presents the concept of attack patterns and USES the UML based attack patterns to describe the static structures and dynamic activities of attacks.

    youdao

  • 星球模式下,拥有标志性大颌外壳可以打开成为攻击模式底部有支撑保证直立状态。

    In planet mode it had the trademark clamping jaws, the shell would open up for an attack mode, and also kept itself upright with pegs on the bottom.

    youdao

  • 惩罚性父母不是细致入微的方式思考而是一种攻击模式哪怕是一丁点故障错误

    The punitive parent is not a person who is capable of thinking in a nuanced manner, but rather a mode that will attack even the slightest faults and mistakes.

    youdao

  • 测试结果表明IIDS可以有效地检测网络入侵行为以及未知攻击模式,达到预期目标

    The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.

    youdao

  • 本文在深入研究系统漏洞网络攻击模式的基础上,提出实现了一种面向网络攻击智能决策支持系统

    This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).

    youdao

  • 周年之际全球报告强调了安全团队防御不断演进网络犯罪不断变化攻击模式时,所面临挑战机遇

    On the ten anniversary, the global report highlights the challenges and opportunities faced by the security team in defense of evolving cyber crime and changing attack patterns.

    youdao

  • 本文首先研究智能决策支持系统体系结构集成方式知识库设计然后系统漏洞和网络攻击模式进行了深入探讨

    This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.

    youdao

  • 基于海军数据突出特点指出信息化条件下的现代海战使用海军数据链将潜艇导弹攻击过程、对潜指挥方式导弹攻击模式带来的影响

    Based on the standing out characters of navy data link in modern sea fight, its effect toward submarine missile attacking course, commanding manner and missile attacking pattern are indicated.

    youdao

  • 使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    youdao

  • 我们问题经典瑞士银行模式规章攻击下。

    One problem is that the classic Swiss banking model is also under regulatory attack.

    youdao

  • 防守模式分析永野元帅下了一个死命令:必须防守的方案也好,攻击的方案也好,保证南部防线安全

    The logic of this defensive pattern imposes on Admiral Nagano an ironclad duty: he must, either by defensive or offensive measures, make the southern arc secure.

    youdao

  • 另一个研究揭示了当游戏者第一人称射击游戏大脑活动模式攻击行为发生时是一致的。

    Another study revealed that gamers had patterns of brain activity consistent with aggression while playing first — person shooter games.

    youdao

  • 鉴于电脑黑客攻击能力不断加强,如图8所示运行变种1适合于直接集成通道应用程序模式一种值得推荐模式

    Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.

    youdao

  • 几乎柏拉图理想模式掩饰范例中,声明中的措辞谴责这起事件(至少确实将此次事件其描述成“攻击事件”),并未具体罪责推在任何一方身上。

    In an almost Platonically ideal example of fudgery, the wording of the statement condemns the incident (which it does at least identify as an "attack"), but places the blame on nobody in particular.

    youdao

  • 大多数开发人员听说关于模式一个很好的例子:结构化查询语言Structured Query Language,SQL)的错误使用导致Web站点受到 SQL 注入攻击

    Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.

    youdao

  • 大多数开发人员听说关于模式一个很好的例子:结构化查询语言Structured Query Language,SQL)的错误使用导致Web站点受到 SQL 注入攻击

    Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定