The program also has Advanced dictionary Manager for a dictionary-based attack.
该项目还得到了一个基于字典词典攻击高级经理。
This paper presents the concept of attack patterns and USES the UML based attack patterns to describe the static structures and dynamic activities of attacks.
该文提出了攻击模式的概念,使用基于UML的攻击模式,描述了攻击的静态结构和动态行为。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
Three JSF versions are being developed: the F-35A conventional takeoff and vertical landing model, the F-35B short takeoff and vertical landing variant, and the F-35C carrier-based attack version.
目前3种类型的联合攻击战斗机正在开发:F -35 A条常规起飞垂直降落型战斗机、F - 35 B短距起飞和垂直降落改进型战斗机和f—35c舰载攻击机型战斗机。
This idea is based on the principle that lions and other predators are far less likely to attack when they feel they are being watched.
当狮子及其他捕食性动物觉得自己正被注视着时,它们就不大可能会继续袭击,这种想法就是基于这一原理。
Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.
黑客可以根据所收集的信息推断出可能的弱点,并选择对选定目标系统的最佳攻击方法。
The often-serious format string attack is based on the idea that an attacker can control the format used to display data.
常见的格式化字符串攻击来自于一个思想:攻击者可以控制显示数据所使用的格式。
They said the command and control server that directed the attack was based in the United States and had come online several weeks before it began the assault.
他们称发布命令并控制这次攻击的服务器位于美国,在开始袭击前几周就连接上了互联网。
The better the configuration, based on deep application knowledge, the more difficult the attack.
借助大量的应用知识,越好的配置WAF,攻击就越困难。
If it's dereferenced in an attribute value, this attack can even damage a SAX-based system by overflowing the limits of a string.
如果与属性值没有任何关联,那么这种攻击甚至可以通过溢出字符串限制来损害基于SAX的系统。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
The Pakistan-based group Lashkar-e-Taiba (LeT) is believed to have planned and carried out the elaborate attack on Mumbai.
以巴基斯坦为基地的虔诚军据信策划并实施了针对孟买的经过周密策划的袭击。
Murray confessed that he "maybe got the balance a little bit wrong" between defence and attack but that his gameplan was based on aggressively taking the game to Nadal.
穆雷坦白说:在对阵纳达尔的时候他采取的是以进攻为主的战术,但在进攻和防守之间可能有一点失衡。
The United States is cautioning Syria against new intervention in Lebanon following a terrorist attack in Damascus late last month that Syria has blamed on Lebanon-based militants.
美国警告叙利亚不要在大马士革上个月底发生恐怖袭击之后再次对黎巴嫩进行干涉。 叙利亚说那次袭击是以黎巴嫩为基地的激进分子发起的。
In fact, a clever attack against Sendmail was based on this insight.
实际上,一个非常聪明的针对Sendmail的攻击正是基于这一原理。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
The attack begins like most Web-based infections: an unsuspecting user visits an infected Website — either a malicious or rigged legitimate one.
该攻击和大多数基于web的攻击类似,均为哄骗不知情的用户访问受感染的恶意网站或被非法操纵的合法网站。
Most evidence points to the Pakistan-based militant group Lashkar-e-Taiba being behind the attack.
大多数证据显示巴基斯坦的激进组织虔诚军(Lashkar - e - Taiba)是幕后黑手。
The Boeing-led team will employ the electronic-attack expertise of Bethpage, N.Y.-based Northrop Grumman Integrated Systems.
波音领导的团队将雇佣位于纽约Bethpage的诺·格公司综合系统部的电子攻击专家。
Cardiologists have had to decide which type of stent to use in heart attack patients based on small randomized trials that didn't include long-term follow-up and reported conflicting results.
心脏病学家必须在以小没有长期随访并且报告的结果有矛盾的的随机试验的基础上,决定心脏病发作的患者用哪种类型的支架。
An expert system of air attack target recognition model based on blackboard model is built after the target information is synthesized, it can simulate the recognition thought of the domain experts.
在对空袭目标信息进行综合利用的基础上,建立了基于黑板模型的多传感器空袭目标识别融合专家系统模型,模拟专家识别思维。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
The decision-making system based on the field two sides of the game situation, decided to our robot at the attack and defend.
决策系统根据现场的敌我双方的比赛态势,决定我方机器人处于进攻还是防守。
The decision-making system based on the field two sides of the game situation, decided to our robot at the attack and defend.
决策系统根据现场的敌我双方的比赛态势,决定我方机器人处于进攻还是防守。
应用推荐