• At Securosis, we recommend a two-pronged attack, one hard (involving technical controls) and the other softer (process and communication).

    我们要说两形式的攻击种比较严重(包括技术控制),一种温和一些(需要进程通讯)。

    youdao

  • However, because tcpserver doesn't attempt to understand the communication, it is very difficult to attack.

    然而因为tcpserver并不试图理解通讯,所以很难攻击

    youdao

  • We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.

    我们知道Twitter构架使得TwitterGoogleFacebook容易遭到攻击但是这种情况下沟通至关重要。

    youdao

  • Such an attack could result in loss of communication between the utility and meters-and the subsequent denial of power to your home or business.

    这样攻击可能造成电表供电设施之间通信中断——最终造成断电

    youdao

  • And people 'communication, let vie between the people mutually, attack mutually, from Sacrifice other materials and come to be satisfied with themselves.

    交流之间相互攀比,相互攻击,从而牺牲其他物质满足自己

    youdao

  • Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    提出了匿名通信系统中的统计攻击模型,对两种攻击模型的攻击能力定量分析

    youdao

  • Current anonymous communication systems were analysed and the important attack forms in them were introduced.

    此基础上对于目前不同的匿名通信系统进行了分析评价,介绍了重要攻击形式

    youdao

  • The WEB service secure communication model can satisfy the basic requirements of secure communication, and performs replay attack resistance efficiently.

    WEB服务安全通信模型能够满足安全通信基本要求并且能够较为高效地抵御攻击

    youdao

  • DS, FH or mixing communication system is used in wireless network attack, information transmitted system is used as kernel unit, and many communication means is synthetically used.

    主要使用DSFH二者混合通信体制核心为信息传输系统可综合采用多种通信手段

    youdao

  • It has features as follows: identity authentication, changeable communication key, secure against active and passive attack.

    方案具有身份认证可变密钥主动被动攻击的优点。

    youdao

  • Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    youdao

  • Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.

    网络通信模型基础上,进一步结合蠕虫传播特征本文提出蠕虫的攻击树模型。

    youdao

  • Marketing communication should not unfairly attack or discredit competitors, assault and imitate other brands' names, or imitate the marketing communications of other marketers to mislead consumers.

    营销传播活动中诋毁竞争者,不应模仿其他成功品牌营销传播方式,消费者产生误导混淆。

    youdao

  • It can resist the leakage of ephemeral secret DH exponent attack while retaining the security of the relative AGKA protocols, and is more efficient in terms of both communication and computation.

    协议除具有相关agka协议安全性外,还有抗临时秘密指数泄露攻击能力,效率也有所提高。

    youdao

  • This paper puts forward a design method of IDL for coordinated attack. The IDL's mode, period, content, and order of communication are discussed in this paper.

    提出一种协同攻击机间互联数据链(IDL设计方法,对机间数据链的传输方式、传输周期、传输内容、传输时序等进行了研究。

    youdao

  • Nodes attacking is one of the most effective instrumentality to attack the tactical communication network... How to carry out an optimal nodes attack is a puzzled problem for a long time.

    节点攻击战术通信网对抗有效手段之一如何实现节点攻击长期困扰攻击方的难题

    youdao

  • Nodes attacking is one of the most effective instrumentality to attack the tactical communication network... How to carry out an optimal nodes attack is a puzzled problem for a long time.

    节点攻击战术通信网对抗有效手段之一如何实现节点攻击长期困扰攻击方的难题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定