• 根据攻击方的攻击进度他们得到更多攻城武器

    Attackers will get more siege vehicles depending on their progression throughout the siege.

    youdao

  • 根据攻击效果不同进行分类,对这些方法简要的综合评价

    Simulation results show that these methods can achieve the desire effect basically, in accordance with different categories based on attacking effect, a brief evaluation on these methods is made.

    youdao

  • 建立了机动再入弹头随机数学模型根据攻击目标要求选择合理滑模变结构开关

    The Stochastic mathematic model of maneuvering reentry warhead was proposed, and the rational slide switch surface was chosen based on the desire of attacking ground target.

    youdao

  • 至于是否需要加大回应赛博攻击手段,则根据攻击规模以及针对公共私营部门攻击意图来决定。

    The need to expand the options for response to cyberattacks is driven by the size and intent of cyberattacks on the U.S. public and private sectors.

    youdao

  • 重点讨论在AODV协议黑洞攻击攻击,并根据攻击的特点,提出了一种利用虫洞原理防御的策略。

    The black hole attack and the gray hole attack on the networks running under the AODV protocol are discussed.

    youdao

  • 根据心理动力学理论预防有害攻击最好方法可能鼓励危害较小攻击行为。

    According to psychodynamic theory, the best ways to prevent harmful aggression may be to encourage less harmful aggression.

    youdao

  • 字典攻击——根据字典词汇,使用搜索方式推测一个有效用户密码

    Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.

    youdao

  • 根据密码复杂程度某些攻击可能花费一个星期的时间。

    Some brute force attacks can take a week depending on the complexity of the password.

    youdao

  • 攻击没有完全成功根据国际核查人员报告伊朗一些运行中的部件减速后停止其他幸存下来

    The attacks were not fully successful: Some parts of Iran's operations ground to a halt, while others survived, according to the reports of international nuclear inspectors.

    youdao

  • 攻击可以根据指数内部dtd子集中有规律地建立实体引用这样,就会使输入文档制造大量文本

    An attacker could also exponentially build up entity references purely in the internal DTD subset so that a small input document produces a large quantity of text.

    youdao

  • 根据即将出版现代生物学上的研究报告,有鲷类通常攻击某一种具有相同表面斑纹发出相似哗哗声的种群

    Members of one damselfish species use facial patterns of speckles and swooshes to identify the fish species they regularly attack, researchers report in an upcoming issue of Current Biology.

    youdao

  • 根据最近的一项对坦桑尼亚自1988年到2009年间攻击人类的500头狮子研究,多数发生蚀月黄昏至晚上10

    According to a recent study examining 500 lion attacks in Tanzania between 1988 and 2009, the majority occured between dusk and 10pm on nights when the moon was waning.

    youdao

  • 根据美国海洋和大气局渔业公司称,它们可能攻击人类鲨鱼中排名第三

    They are the third most likely shark to attack humans, according to NOAA Fisheries.

    youdao

  • 根据隐私权信息中心报告说,这些攻击今年几百起在线安全侵入之一危及2200万用户的数据信息。

    These attacks are among the hundreds of online security breaches this year alone, compromising data of more than 22 million people, according to the Privacy Rights Clearinghouse.

    youdao

  • 黑客可以根据所收集信息推断出可能弱点选择选定目标系统最佳攻击方法

    Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.

    youdao

  • 一个明显攻击,“可能使条纤维光缆崩溃”并且也许严重可以根据议定书第5条中的联合防御条款作出响应

    The next significant attack, it said, “may well come down a fibre-optic cableand may be serious enough to merit a response under the mutual-defence provisions of Article 5.

    youdao

  • 根据应用程序流行度攻击幅度可以小时攻击次至同一时间段攻击数百甚至数千次

    Depending on the application's popularity, attacks can range from only a few an hour to several hundred or thousand in the same time period.

    youdao

  • 观察每张脸2000毫秒39毫秒参与者根据自己看法每个攻击程度进行至七级的等级评定。

    The participants then rated how aggressive they thought each person was on a scale of one to seven, after viewing each face for either 2000 milliseconds or 39 milliseconds.

    youdao

  • 根据官方说法港口仍在运作然而攻击影响到了补给船只进出。

    The port remained operational, according to officials, but the strikes would impact the limited movement of supply ships.

    youdao

  • 根据设法保护资产以及攻击可能会如何处理这些资产来考虑安全性。

    Think in terms of the assets you're trying to protect and what an attacker might want to do to them.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 太多欧洲政客全部责任给投机者对冲基金评级机构其余就毫无根据攻击欧元

    Too many European politicians lay all the blame on speculators, hedge funds, rating agencies and the rest forunwarrantedattacks on the euro.

    youdao

  • 攻击数量有限而且多半可以根据性质定位。

    However, the number of attacks are limited and most likely targeted in nature.

    youdao

  • 显然攻击客户机可以根据自己喜好发送任何SACK选项不太容易看出的个问题是,可以轻易控制攻击方的重队列的长度。

    An attacking client can obviously send any SACK option it likes, but less obviously, it can also easily control the size of the peer's retransmission queue.

    youdao

  • 比方说,如果遥控飞机根据提供信息阿特夫发动致命攻击准备就绪后探测汽车赶上了一校车那么遥控飞机就可能暂停对他进行发射攻击

    If, for example, the drone from which the fatal attack on Atef was launched had sensed that his car was overtaking a school bus, it might then have held fire.

    youdao

  • 根据协议,俄罗斯2017年放弃其在乌克兰克里米亚海军基地,在该地区一旦有事,西北风级两栖攻击舰就可以投入使用。

    The Mistrals could matter in any conflict over Crimea in Ukraine, where Russia is due to give up a naval base in 2017.

    youdao

  • 根据大夫诊断,这次击打具有攻击性。

    Which was aggressive, according to the doctor.

    youdao

  • 根据大夫诊断,这次击打具有攻击性。

    Which was aggressive, according to the doctor.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定