This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
They set off, two men out in front as scouts, two behind in case of any attack from the rear.
他们出发了,两人在前作为侦察员,两人殿后以防后方攻击。
India is seeking 22 attack helicopters and 15 transport helicopters and has not set a date to announce the winning proposals.
印度正在寻求采购22架攻击直升机和15架运输直升机,具体中标日期还未宣布。
In the original spec, you arrived at the meeting location before anyone else, so you could plan your attack and set traps.
原始的设计规范是:你需要在不引起任何人注意的情况下到达开会地点,这样就可以从容的计划你的攻击和设计陷阱。
A rooftop camera network was set up over Mong Kok, the site of one attack, has failed to catch those responsible.
在袭击发生地之一的旺角已建立起全面屋顶摄像网络,但未抓获袭击嫌疑人。
Shock set in and I found a cab for her, making sure she got home okay as the trains were temporarily suspended in fear of a London attack.
由于伦敦唯恐袭击再次发生而暂时停止运营,在惊恐中我为她找了一辆出租车,确保送她平安到家。
Local people would attack the Jews, or the Jews would try to set up an extra big meeting house for themselves, and it would cause local problems.
当地人攻击犹太人,或者犹太人企图建造超大的礼拜堂,引起各种问题。
Last Tuesday, in a separate attack on the same mountain, another rambler was set upon by the cows, suffering wounds in the back of the head, face and arms and legs.
上周二,一名游客在同一地点遭奶牛袭击,后脑勺、脸部、四肢受伤。
One way to avoid the attack is to use an initialized flag, which is set to true once an object has been correctly created.
一种避免攻击的方式是使用initialized标志,在正确创建对象之后它被设置为true。
That means the attacker can set up the entire attack in essentially one operation!
这意味着攻击者本质上能够在一个操作中完成整个攻击!
Instead, they partition their enterprise into a set of communities and attack them, often in parallel.
相反,他们将他们的企业分割成一组群落并逐个攻克它们(常常并行进行)。
Armed police set up barricades around the sites of the attacks, and local people were seen Shouting at each other, angry that another terror attack had hit the city.
全副武装的警察在袭击地点周围设置了路障,当地民众互相叫喊,对这个城市再次遭受恐怖袭击愤慨不已。
There is also a castle in Europe with defenses set to defend against an attack from the inside out.
欧洲还有一处城堡其防御设施是用于防御来自地内的攻击。
After the attack, the FBI and the U.S. Postal Inspection Service set up a task force to investigate who had done it.
袭击发生后,FBI和美国邮政检查服务局成立了一个工作队来调查谁是幕后黑手。
CASINO in the troubled northern city of Monterrey was set alight yesterday afternoon, in an attack that officials say killed 40 people.
莫特雷城北部一直是多事之地,昨日下午,这里的一家赌场燃起了大火,相关官员称有40人丧生其中。
The message purported to set out a plot to attack a naval base, apparently Mayport in Jacksonville, Florida, with the aim of achieving the “complete destruction” of the USS John F.
这条信息谣传要发动一次袭击美海军基地,显然他的目标是在佛罗里达,杰克逊威尔的梅港。
So he took his men, divided them into three companies and set an ambush in the fields. When he saw the people coming out of the city, he rose to attack them.
他就把他的人分作三队,埋伏在田间,看见示剑人从城里出来,就起来击杀他们。
After the German attack on the Soviet Union in June 1941, the Poles and Russians were forced to set aside hostilities to become, instead, the uneasiest of Allies.
1941年6月,德国袭击苏联,波兰和俄国被迫放下成见成为最不自在的盟友。
The class may also define a set of functions, including move and attack .
该类也可能定义一组函数,其中包括move和attack 。
And even if an attack succeeded in penetrating all of Iran's underground sites-a big if-it could do no more than set back Iran's ambitions temporarily.
并且即使突袭能成功地渗入伊朗所有地下核设施—一个大胆的假设—也仅仅是暂时遏制住伊朗的核野心。
Xu Sheng said, “Set up scaling ladders and towers so that we can see inside and then attack.”
徐盛曰:"可竖云梯,造虹桥,下观城中而攻之。"
TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.
针对TEMPEST ATTACK对计算机信息安全构成的威胁,建立了基本的电磁辐射模型。
We can also set up a really effective system of defense in space to protect our country from foreign attack.
我们也可以设立真正有效率的太空防卫系统,以保护国家免受外来攻击。
ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.
指令表随机化(isr)技术是一种新型的保护系统免遭任何类型注入码攻击的通用方法。
That can ensure the one to one mapping relationship between the feature set and the image, and avoid the counterfeit attack.
这可以保证特征集与图像之间的一一映射关系,避免伪造攻击。
That can ensure the one to one mapping relationship between the feature set and the image, and avoid the counterfeit attack.
这可以保证特征集与图像之间的一一映射关系,避免伪造攻击。
应用推荐