This scheme is the extension of the self-organized key management, and imports trust decision mechanism which promotes the system's ability of resisting mobile attack.
该方案是对自组织密钥管理的扩充,通过引入信任决策机制提高了系统抗漫游攻击的能力。
But they attack only one settlement at a time, so you can keep your mobile Vikings moving from hotspot to hotspot.
但是他们进攻,唯一的解决,那么你可以让你的手机移动,从北欧热点研究热点。
There has not been a massive attack yet like those targeting desktop PCs, and that's partly because there are so many different mobile phone operating systems.
部分是由于存在着许多不同的移动电话操作系统的原因,目前尚未出现类似于针对桌面个人电脑一样的大规模攻击。
Diller advised that all companies should aggressively attack the mobile opportunity.
Diller建议,所有企业都应该积极地利用手机的市场潜能。
Mobile phone viruses use ordinary SMS, MMS, Internet browsing, download software and ringtones, etc, will also be transmitted attack expanded to mobile gateway, WAP server or other network equipment.
手机病毒利用普通短信、彩信、上网浏览、下载软件与铃声等方式传播,还将攻击范围扩大到移动网关、WAP服务器或其它的网络设备。
The new systems are more mobile and thus less vulnerable to attack.
新系统更机动,因此较不易受到袭击。
The characteristic of offensive attack: Assaults the attack way by attacks mobile personally primarily, accounted for 61.57%, the conclusion way by shooting on the move and 3 point pitching primarily.
抢攻的特点:抢攻的进攻方式以个人机动进攻为主,占61.57%,结束方式以行进间投篮和3分远投为主。
Like desktop browsers, mobile browsers are susceptible to attack by Trojan viruses.
和电脑桌面浏览器一样,移动浏览器很容易受到病毒木马的攻击。
Still, encrypting the mobile a-gent's result by means of secret key associated with the host on which the agent runs can prevent the result from spying and tampering attack.
而且,利用与运行移动代理的主机相关的密钥对运行结果加密,能有效地防止对移动代理运行结果的窥探和篡改攻击。
By using authentication, this solution avoids the counterfeit attack and replay attack directed against the Mobile IP register process.
该方案通过对移动IP注册消息的认证,避免了针对注册过程的假冒攻击和重发攻击。
Additionally, someone attack the mobile telephone by short message and short message protocol, someone attack SIM card by network service and side channel.
还有针对手机漏洞的短消息、SIM卡短消息协议处理漏洞的攻击;利用短消息网站漏洞的拒绝服务、SIM卡旁路的攻击等。
The guidance and control system is properly designed and can meet the accuracy and attack Angle requirement for still or mobile target.
制导控制系统设计合理,对于静止和机动目标,落点射击精度和落角均满足设计要求。
Meanwhile, the approach can prevent against the AMR attack and it provides promising prospect for the secure broadcast and management of mobile audio.
同时,本算法还能够抵抗一定的AMR攻击,为手机音频的安全传播和管理提供了新的前景。
Days after a deadly attack at a Georgia mobile home, police have identified the eight victims as members of a large extended family.
格鲁吉亚汽车住房袭击事件几天后,警方已经确定了这八个受害人系一个大家庭的成员。
But the mobile phone business was mature and sophisticated when Steve Jobs decided to attack.
而当斯蒂夫。乔布斯决定进军手机业时,这个产业已经非常细分和成熟了。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
It is also vital that capabilities of night target identification, mobile land target survilliance, combat command and control and precision of attack should be strengthened.
加强夜间目标识别和非通视条件下地面活动目标侦察、作战指挥和打击能力;
It is also vital that capabilities of night target identification, mobile land target survilliance, combat command and control and precision of attack should be strengthened.
加强夜间目标识别和非通视条件下地面活动目标侦察、作战指挥和打击能力;
应用推荐