• In this attack, an attacker USES weaknesses in the design of the database or Web page to extract information or even manipulate information within the database.

    这种攻击中,攻击者利用数据库web页面设计缺陷数据库提取信息甚至操纵数据库信息。

    youdao

  • Lapatinib is a product of the growing field of molecular medicine-the design of drugs to attack specific protein molecules associated with particular diseases.

    Lapatinib一种分子药物市场蓬勃发展产品——被设计用来靶向治疗疾病相关特定蛋白质分子

    youdao

  • This is the design philosophy that leads to overstuffed websites that resemble Times Square in their relentless attack on the senses.

    就是这种设计哲学导致类似时代广场这种冗长网站,给人类感官无情打击

    youdao

  • The designs for the clone barracks dates back to concepts developed for Star Wars: Episode II Attack of the Clones, which were explored by the concept design team back in 2000, but never finished.

    克隆人营房设计可以回溯星球大战:第二部——克隆人进攻》打造出来的概念,2000年时的概念设计小组这些概念进行了探索,从未完成设计。

    youdao

  • This gentleman had desisted his attack, finding no room to expect the accomplishment of his design.

    这位公子因为看出计划没有实现希望,就停止了进攻

    youdao

  • The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    图像水印算法设计攻击技术互相促进对立面

    youdao

  • Note that still the velocity is constant along the desired segments at the corresponding design angles of attack.

    看到依然不断沿着速度预期相应环节设计迎角

    youdao

  • "He was an early influence for me as a representative of the modern avantgarde intersection between art and design, " said Hadid, who died earlier this year following a sudden heart attack.

    哈迪德今年早些时候因心脏病突发死亡,她曾说:“作为现代前卫艺术设计之间融合的代表早期有着很大的影响。”

    youdao

  • TAIL DESIGN : The STOL CH 801 tail sections are designed to provide maximum effectiveness (control) at slow speeds and at high angles of attack.

    尾部设计:甲烷短距起降801目的提供最大效益控制)的速度缓慢

    youdao

  • They contrived to murder their boss; design a new sales strategy; plan an attack.

    他们设计谋杀老板设计销售策略设计进攻

    youdao

  • This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.

    本文首先研究智能决策支持系统体系结构集成方式知识库设计然后系统漏洞网络攻击模式进行了深入探讨

    youdao

  • In the design of watermark encoder, through the combination of side information and watermark, our system also obtained the robustness against copy attack.

    水印编码设计上,通过将载体的个性信息水印融合,使整个系统拷贝攻击具有鲁棒性

    youdao

  • With the appearance of algebraic attack, some new criterions for design of cryptstems are added.

    新的攻击方法出现必将密码算法的设计提出新的要求。

    youdao

  • Especially, the masking design in S-box of advanced encryption standard can make the algorithm safer to against linear attack.

    特别对于高级加密标准算法S设计增加掩码设计可以加强抗线性攻击安全程度

    youdao

  • In order to attack the target with big impact Angle, over compensation of gravity is added to the design.

    为了实现攻击目标,进行了制导过重设计。

    youdao

  • I need to design an application that protects some data in a database against root attack.

    需要设计一个应用程序,以保护数据库中的一些数据库免受攻击

    youdao

  • My attack is not based on quibbles about rebuilding methods or hairsplitting about fashions in design.

    抨击并不是以关于改建手法的模棱两可的双关语为基础,也不是对设计的时尚吹毛求疵

    youdao

  • Second, the paper proposed the design and implementation of threat data collection subsystem, alert correlation subsystem and attack data extraction subsystem.

    随后攻击数据采集子系统告警关联分析子系统攻击数据生成子系统进行详细设计实现

    youdao

  • This paper, based on Ether network environment, primarily presents design and realization of data packet seize which is one of the measure against the hacker's attack.

    主要介绍基于以太网环境数据包的截获设计实现。数据包截获的实现防范网络黑客攻击的措施之一

    youdao

  • The extended linearization of nonlinear systems is used to design flight control systems at high angle of attack.

    利用非线性系统扩展线性化方法设计具有大迎非线性飞行控制系统。

    youdao

  • Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.

    接着为了防止恶意代码发现攻击,本文利用硬件虚拟技术LAHF设计自隐藏模块

    youdao

  • This paper puts forward a design method of IDL for coordinated attack. The IDL's mode, period, content, and order of communication are discussed in this paper.

    提出一种协同攻击机间互联数据链(IDL设计方法,对机间数据链的传输方式、传输周期、传输内容、传输时序等进行了研究。

    youdao

  • The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.

    第三部分应用推广构造攻击方法指导密码协议设计

    youdao

  • And experiments demonstrated that the system could respond to attack events immediately and reasonably, reduce the risk of intrusion, so it has achieved the goal of our design.

    实验证明模块能够及时合理地攻击行为进行响应减小入侵风险达到了设计目标

    youdao

  • As seen above the design Angle of attack for the second segment is10deg.

    如上所述,设计第二部分是10甘醇。

    youdao

  • As seen above, the design Angle of attack for the second segment is10 deg.

    如上所述,设计第二部分是10甘醇。

    youdao

  • This kinetic model can be used in ballistic calculation of projectile with large angle of attack and also in the design of some smart munitions(e. g. target sensitivity projectile).

    动力学模型用于弹丸飞行时弹道计算某些灵巧弹药)的设计

    youdao

  • The robust adaptive flight control system design with neural network of attack helicopter is studied in this dissertation and super maneuver nimble of attack helicopter is realized.

    本文武装直升机机动、高敏捷性神经网络鲁棒自适应飞行控制系统设计问题展开研究。

    youdao

  • The robust adaptive flight control system design with neural network of attack helicopter is studied in this dissertation and super maneuver nimble of attack helicopter is realized.

    本文武装直升机机动、高敏捷性神经网络鲁棒自适应飞行控制系统设计问题展开研究。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定