The traditional all round attack strategy is based on the off boresight technology, which cannot attack rear targets.
这种全向攻击是指本机可以攻击从各个方向接近本机的目标。
It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.
理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。
In regard to the marketing strategy, Dongguan City XINYUJIANBANG Media Co., Ltd enters into network video market as a challenger. We mainly take flanking attack and indirect attack strategy.
在营销策略的制定方面,东莞市心域建帮传媒传媒责任有限公司作为市场挑战者的角色进入网络视频市场,我们主要采取侧翼进攻和迂回进攻的策略。
They teach us strategy: when to attack, and when to avoid a fight.
游戏训练我们的策略:何时攻击、何时避战。
The effectiveness of this strategy was demonstrated most spectacularly in the February 2006 attack on an iron-ore mine in Bacheli, 10 km from Gumiyapal.
2006年2月份的巴切里铁矿袭击充分展示了这种策略的有效性。铁矿距离古米亚·帕尔村10公里外。
The strategy was two-fold. First, out-muscle United. Then, channel the attack through Peter Crouch, the tall target man.
战术就两点。第一,身体流生吃曼联。其次,进攻中以高中锋皮特·克劳奇为支撑点发动攻势。
We found that for every viral strategy of attack, the bacteria would adapt to defend itself, which triggered an endless cycle of co-evolutionary change.
我们发现细菌能对病毒每一种进攻策略产生适应机制以保护自己,而这又触发了病毒下一次的进化,形成无止境的循环。
Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
As of today, both will be severely undermined by the Berlin attack — with no alternative at hand, either in terms of a viable candidate or in terms of strategy.
今天,这条口号和基民盟都将因此次的柏林袭击遭受重创,而基民盟手中没有备用选择——无论是有胜选实力的备用候选人,还是备用策略。
Your opponent will probably get wise to your strategy and start trying to attack the Corruptors.
您得对手也许会明白您得战略而开始试图攻击腐蚀者。
A nonlinear guidance law and control strategy is proposed for aircraft applying to attack the ground fixed targets.
对于攻击地面固定目标的飞行器,提出一种非线性制导律和控制方法。
They contrived to murder their boss; design a new sales strategy; plan an attack.
他们设计谋杀老板;设计一个新销售策略;设计一次进攻。
While recognizing early heart-attack warning signs is important, the best strategy for most young women is preventing heart disease.
虽然辨识出早期心脏病发作的警告信号很重要,但是对多数年轻女性最佳的策略是预防心脏病。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
When the Death Star arrived in the Yavin system, Dodonna formulated the Rebels' crucial attack run strategy of the Battle of Yavin, and briefed the Rebel pilots as to its logistics.
死星进入雅文星系时,多登纳谋划了义军在雅文战役中至关重要的攻击疾飞策略,并就其后勤保障向义军飞行员做了简短报告。
The new strategy involves implanting into the gums antibiotics or other germ killers so that they can attack bacteria in the pockets where they fester.
新的方式是在牙龈内植入抗菌素或其他能杀死细菌的药物,这些药物可以在产生溃烂的地方杀死细菌。
We outline a distributed strategy to tackle the history-revision attack threat in a simple and elegant way.
我们采取了一种分散的策略,利用一个简单而合理的方式来处理历史攻击的威胁。
The big assault on DIE HARD ATTACK is just glorious, and suggests that this is probably going to be another wonky classic of real-time strategy.
舍命攻击的大型突袭太宏伟了。这预示着本作可能会成为实时策略又一经典。
You may divide cyber retailers into three subsets and attack each with a different strategy.
您可以将网上零售商分成三个子类,用不同的战略对付他们。
This perfectly corresponds to the group strategy which we have called "protect and attack".
这与我们称之为“保护与进攻”的集团战略是完全相符的。
The preventive strategy of the attack on certification is another research focus of this article.
认证中心的攻击的防范策略是本文的另一研究重点。
The paper introduces the strategy about computing trust value, maintaining the record of history remember, preventing sybil attack and slandering and cooperative cheat.
对于模型中的信任度求解、节点成员表的历史记录维护、冒名、诋毁及协同作弊等关键问题给出了解决策略。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.
入侵检测技术就是这样一种动态策略,它通过对网络系统实时监控,来达到动态保护的目的。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
This model protects the active network node from the attack of vicious capsule with authentication, authorization and active capability loads strategy dynamically.
该模型采用认证、授权、主动权能动态加载策略等安全措施保护主动节点资源免受恶意信包的攻击。
China implements a military strategy of active defense. Strategically, China pursues a principle featuring defensive operations, self-defense and attack only after being attacked.
中国实行积极防御军事战略,在战略上坚持防御、自卫和后发制人的原则。
China implements a military strategy of active defense. Strategically, China pursues a principle featuring defensive operations, self-defense and attack only after being attacked.
中国实行积极防御军事战略,在战略上坚持防御、自卫和后发制人的原则。
应用推荐