根据攻击方的攻击进度,他们能得到更多的攻城武器。
Attackers will get more siege vehicles depending on their progression throughout the siege.
根据攻击效果不同进行分类,对这些方法做了简要的综合评价。
Simulation results show that these methods can achieve the desire effect basically, in accordance with different categories based on attacking effect, a brief evaluation on these methods is made.
建立了机动再入弹头随机数学模型,根据攻击目标的要求选择合理的滑模变结构开关面。
The Stochastic mathematic model of maneuvering reentry warhead was proposed, and the rational slide switch surface was chosen based on the desire of attacking ground target.
至于是否需要加大回应赛博攻击的手段,则是根据攻击规模以及针对公共和私营部门的攻击意图来决定。
The need to expand the options for response to cyberattacks is driven by the size and intent of cyberattacks on the U.S. public and private sectors.
重点讨论在AODV协议下的黑洞攻击和灰洞攻击,并根据攻击的特点,提出了一种利用虫洞原理防御的策略。
The black hole attack and the gray hole attack on the networks running under the AODV protocol are discussed.
根据心理动力学理论,预防有害攻击的最好方法可能是鼓励危害较小的攻击行为。
According to psychodynamic theory, the best ways to prevent harmful aggression may be to encourage less harmful aggression.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
根据密码的复杂程度,某些蛮力攻击可能花费一个星期的时间。
Some brute force attacks can take a week depending on the complexity of the password.
攻击没有完全成功:根据国际核查人员的报告,伊朗一些运行中的部件减速后停止,其他的幸存下来。
The attacks were not fully successful: Some parts of Iran's operations ground to a halt, while others survived, according to the reports of international nuclear inspectors.
攻击者也可以根据指数只在内部dtd子集中有规律地建立实体引用,这样,就会使小的输入文档制造出大量的文本。
An attacker could also exponentially build up entity references purely in the internal DTD subset so that a small input document produces a large quantity of text.
根据即将出版的现代生物学上的一篇研究报告,有一种鲷类鱼通常会攻击某一种具有相同表面斑纹和发出相似哗哗声的种群。
Members of one damselfish species use facial patterns of speckles and swooshes to identify the fish species they regularly attack, researchers report in an upcoming issue of Current Biology.
根据最近的一项对坦桑尼亚自1988年到2009年间攻击人类的500头狮子的研究,多数发生在蚀月的黄昏至晚上10点。
According to a recent study examining 500 lion attacks in Tanzania between 1988 and 2009, the majority occured between dusk and 10pm on nights when the moon was waning.
根据美国海洋和大气局渔业公司称,它们在最可能攻击人类的鲨鱼中排名第三。
They are the third most likely shark to attack humans, according to NOAA Fisheries.
根据隐私权信息中心的报告说,这些攻击是今年里几百起的在线安全侵入之一,危及2200万用户的数据信息。
These attacks are among the hundreds of online security breaches this year alone, compromising data of more than 22 million people, according to the Privacy Rights Clearinghouse.
黑客可以根据所收集的信息推断出可能的弱点,并选择对选定目标系统的最佳攻击方法。
Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.
下一个明显的攻击,它说,“很可能使一条纤维光缆崩溃”并且也许严重到可以根据议定书第5条中的联合防御条款作出响应。
The next significant attack, it said, “may well come down a fibre-optic cable” and may be serious enough to merit a response under the mutual-defence provisions of Article 5.
根据应用程序的流行度,攻击幅度可以为一小时攻击几次至同一时间段内攻击数百甚至数千次。
Depending on the application's popularity, attacks can range from only a few an hour to several hundred or thousand in the same time period.
观察每张脸2000毫秒或39毫秒后,参与者要根据自己的看法,为每个人的攻击性程度进行一至七级的等级评定。
The participants then rated how aggressive they thought each person was on a scale of one to seven, after viewing each face for either 2000 milliseconds or 39 milliseconds.
根据官方说法,港口仍在运作,然而攻击影响到了补给船只的进出。
The port remained operational, according to officials, but the strikes would impact the limited movement of supply ships.
根据您正设法保护的资产以及攻击者可能会如何处理这些资产来考虑安全性。
Think in terms of the assets you're trying to protect and what an attacker might want to do to them.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
太多的欧洲政客将全部责任推给投机者,对冲基金,评级机构,其余的就毫无根据地攻击欧元。
Too many European politicians lay all the blame on speculators, hedge funds, rating agencies and the rest for “unwarranted” attacks on the euro.
但攻击的数量有限而且多半可以根据性质定位。
However, the number of attacks are limited and most likely targeted in nature.
显然,攻击客户机可以根据自己的喜好发送任何SACK选项,但不太容易看出的一个问题是,它可以轻易控制被攻击方的重传队列的长度。
An attacking client can obviously send any SACK option it likes, but less obviously, it can also easily control the size of the peer's retransmission queue.
比方说,如果遥控飞机根据所提供的信息对阿特夫发动致命攻击准备就绪后探测到他的汽车正赶上了一辆校车,那么遥控飞机就可能暂停对他进行发射攻击。
If, for example, the drone from which the fatal attack on Atef was launched had sensed that his car was overtaking a school bus, it might then have held fire.
根据协议,俄罗斯将在2017年放弃其在乌克兰克里米亚的一处海军基地,在该地区一旦有事,西北风级两栖攻击舰就可以投入使用。
The Mistrals could matter in any conflict over Crimea in Ukraine, where Russia is due to give up a naval base in 2017.
根据大夫诊断,这次击打很具有攻击性。
根据大夫诊断,这次击打很具有攻击性。
应用推荐