• The program also has Advanced dictionary Manager for a dictionary-based attack.

    项目得到了一个基于字典词典攻击高级经理

    youdao

  • This paper presents the concept of attack patterns and USES the UML based attack patterns to describe the static structures and dynamic activities of attacks.

    该文提出了攻击模式概念使用基于UML的攻击模式,描述攻击静态结构动态行为

    youdao

  • An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.

    基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径

    youdao

  • Three JSF versions are being developed: the F-35A conventional takeoff and vertical landing model, the F-35B short takeoff and vertical landing variant, and the F-35C carrier-based attack version.

    目前3种类型的联合攻击战斗机正在开发F -35 A条常规起飞垂直降落战斗机、F - 35 B距起飞垂直降落改进型战斗机和f—35c舰载攻击机型战斗机。

    youdao

  • This idea is based on the principle that lions and other predators are far less likely to attack when they feel they are being watched.

    狮子其他食性动物觉得自己注视着时,它们不大可能会继续袭击这种想法就是基于这一原理

    youdao

  • Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.

    黑客可以根据所收集信息推断出可能弱点选择选定目标系统最佳攻击方法

    youdao

  • The often-serious format string attack is based on the idea that an attacker can control the format used to display data.

    常见格式化字符串攻击来自于思想攻击者可以控制显示数据所使用格式

    youdao

  • They said the command and control server that directed the attack was based in the United States and had come online several weeks before it began the assault.

    他们发布命令控制这次攻击服务器位于美国,在开始袭击周就连接上了互联网

    youdao

  • The better the configuration, based on deep application knowledge, the more difficult the attack.

    借助大量应用知识越好的配置WAF攻击困难

    youdao

  • If it's dereferenced in an attribute value, this attack can even damage a SAX-based system by overflowing the limits of a string.

    如果属性没有任何关联,那么这种攻击甚至可以通过溢出字符串限制来损害基于SAX系统

    youdao

  • To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.

    防止此类攻击基于md5哈希证书签名者证书受信任

    youdao

  • The Pakistan-based group Lashkar-e-Taiba (LeT) is believed to have planned and carried out the elaborate attack on Mumbai.

    巴基斯坦为基地的虔诚军策划实施了针对孟买的经过周密策划的袭击。

    youdao

  • Murray confessed that he "maybe got the balance a little bit wrong" between defence and attack but that his gameplan was based on aggressively taking the game to Nadal.

    穆雷坦白说:在对阵纳达尔时候采取的是以进攻为主的战术在进攻防守之间可能一点失衡

    youdao

  • The United States is cautioning Syria against new intervention in Lebanon following a terrorist attack in Damascus late last month that Syria has blamed on Lebanon-based militants.

    美国警告叙利亚不要大马士革上个月发生恐怖袭击之后再次黎巴嫩进行干涉。 叙利亚说那次袭击是以黎巴嫩为基地的激进分子发起的。

    youdao

  • In fact, a clever attack against Sendmail was based on this insight.

    实际上非常聪明针对Sendmail攻击正是基于一原理。

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • The attack begins like most Web-based infections: an unsuspecting user visits an infected Website — either a malicious or rigged legitimate one.

    攻击大多数基于web的攻击类似,均为哄骗不知情用户访问感染的恶意网站被非法操纵的合法网站。

    youdao

  • Most evidence points to the Pakistan-based militant group Lashkar-e-Taiba being behind the attack.

    大多数证据显示巴基斯坦的激进组织虔诚军(Lashkar - e - Taiba)是幕后黑手

    youdao

  • The Boeing-led team will employ the electronic-attack expertise of Bethpage, N.Y.-based Northrop Grumman Integrated Systems.

    波音领导团队雇佣位于纽约Bethpage的诺·格公司综合系统部的电子攻击专家。

    youdao

  • Cardiologists have had to decide which type of stent to use in heart attack patients based on small randomized trials that didn't include long-term follow-up and reported conflicting results.

    心脏病学家必须没有长期随访并且报告结果有矛盾的的随机试验基础决定心脏病发作患者哪种类型支架

    youdao

  • An expert system of air attack target recognition model based on blackboard model is built after the target information is synthesized, it can simulate the recognition thought of the domain experts.

    在对空袭目标信息进行综合利用的基础上,建立了基于黑板模型的多传感器空袭目标识别融合专家系统模型,模拟专家识别思维

    youdao

  • To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合的攻击检测模型(GADM)。

    youdao

  • Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.

    全面分析攻击方案基础上,构造了一种增强代理多重签名方案。

    youdao

  • The decision-making system based on the field two sides of the game situation, decided to our robot at the attack and defend.

    决策系统根据现场敌我双方比赛态势决定我方机器人处于进攻还是防守。

    youdao

  • The decision-making system based on the field two sides of the game situation, decided to our robot at the attack and defend.

    决策系统根据现场敌我双方比赛态势决定我方机器人处于进攻还是防守。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定