• You can do likewise for the vulnerability and threat identification Web services.

    可以漏洞威胁标识Web服务进行类似的处理。

    youdao

  • According to characteristics of threat identification and Bayesian network, a method of threat identification based on Bayesian network is brought forward.

    根据威胁识别叶斯网络特点提出了基于贝叶斯网络的威胁识别方法

    youdao

  • Good threat signature identification will be an ongoing problem as new types of threats emerge.

    随着威胁不断出现,大量威胁签名认证一直是个问题

    youdao

  • Radar usage identification is the base of the radar type analysis and threat evaluation.

    雷达用途识别分析雷达型号和进行威胁评估基础

    youdao

  • When threat is not available, the link between social identification and in-group favoritism is weak with the high trust toward in-group.

    而当威胁存在时社会认同群体评估之间的相关程度微弱,主要是对内群体的信任度的提高。

    youdao

  • When threat is available, the social identification of group is influenced by out-group evaluation and the difference between groups.

    群体独特性受到威胁条件下,群体社会认同受到外群体评估群体区分度的影响。

    youdao

  • Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.

    数字信号调制类型自动识别应用许多领域包括电子战监视威胁分析

    youdao

  • Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.

    数字信号调制类型自动识别应用许多领域包括电子战监视威胁分析

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定