• Why can't you put that in your paper, or if you want, just publish the paper, which is interesting and then have a postscript in which you attack the... Because that's obviously relevant.

    为什么它们写进论文里呢,或者如果想的话,可以发表篇论文,有意思,之后可以有一个补充说明来抨击因为显然相关的。

    youdao

  • And I sort of gave him hints about how to attack Irving Singer and his writing and he took me up on that and then what I published was a much less favorable paper.

    给了很多暗示怎样抨击欧文·辛格作品接受了的意见,之后发表篇论文中不有利于我。

    youdao

  • What's certain is that Bayern's individual class in attack looks strong enough to paper over defensive cracks that can approach Grand Canyon size at times.

    可以确信拜仁个人进攻能力足以摧毁特脆弱的防线

    youdao

  • An emerging threat, first outlined by Amit Klein in a paper in 2004, is the blind XPath injection attack (see Resources).

    最近开始出现种威胁(最初AmitKlein于2004年篇论文中概述)XPath攻击(请参阅参考资料)。

    youdao

  • So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.

    所以我会立刻写好的一段打印出来,看看一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。

    youdao

  • In this paper, the method of reentry maneuver guidance applying to attack the ground fixed target is described by using flight dynamics principle and modern control theory.

    本文运用飞行力学原理现代控制理论攻击地面固定目标飞行器再入机动制导方法进行了研究。

    youdao

  • "Man pages map" a paper for the opposition against the then vernacular, given the tendency to promote retro sharp attack.

    《二十四孝文中,作着对当时反对白话文提倡复古倾向给予了尖锐的抨击

    youdao

  • In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    这里我们对僵尸网络,普遍攻击技术以及涉及到的个人一个更贴近观察

    youdao

  • The best method, therefore, for calculating what your DPS will be given a gear or talent change, is to be able to predict with certainty your paper doll ranged attack speed and damage spread.

    因此计算装备天赋改变对于DPS变化的最好方法准确地预测状态系统中的远程攻击速度伤害差异

    youdao

  • To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合的攻击检测模型(GADM)。

    youdao

  • The main purpose in the paper is exposing holes in protocols, using them to attack network and giving schemes for defending attacks.

    本文主要目的就是揭示协议中的漏洞,如何利用漏洞进行攻击以及怎样防范攻击。

    youdao

  • After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.

    研究模糊数学理论基础上,设计了一个基于模糊数学的攻击危害度评判模型

    youdao

  • Using rebuttals of evidence in an argumentative paper can both attack the arguments of your opponents and support your own ones.

    议论文写作中利用反证法常很好地驳斥对方论点树立自己论点。

    youdao

  • This paper focuses on discovering the potential attack behaviors by analyzing association rules in audit data.

    本文通过审计数据进行关联规则分析,发现潜在攻击系统行为

    youdao

  • In this paper, ARP attack on analyzing the problems and gives recommendations to address such attacks.

    本文通过对ARP攻击问题分析探讨给出了解决此类攻击建议

    youdao

  • This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.

    文章介绍现有信息隐藏系统模型攻击形式指出加入认证理论的必要性

    youdao

  • This paper expounds the characteristics of network attack, and puts forward corresponding measures.

    本文阐述网络攻击特点提出网络安全的防范措施。

    youdao

  • According to the two attack models, this paper presents a security routing protocol based on Reputation Systems.

    针对两种特殊的攻击方式本文提出了一个基于声誉机制安全协议

    youdao

  • This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.

    文章介绍攻击模型提出了一种基于攻击树的网络攻击系统可以根据目标实际情况制定出攻击策略,实施攻击。

    youdao

  • A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.

    本文提出了一个面向测试协议攻击描述模型以及相应的协议攻击测试算法。

    youdao

  • The different network flow graphs are given according to different attack intensity by changing parameter settings in the paper.

    通过调整相关的实验参数设置给出了不同攻击强度攻击子网的通讯流量

    youdao

  • By analyzing the principles of Smurf attack, this paper proposes the detection method and defense technology of this attack.

    该文分析这种攻击实施原理的基础上,提出这种攻击的检测方法防范技术

    youdao

  • The paper summarized the method of attack patterns describing and analysis the method's advantage and disadvantage.

    本文主要总结攻击模式表示方法对各种方法进行分析

    youdao

  • The paper studies whether the law principle of target selection and attack is practical and how to use it in the complex electromagnetic environment.

    文中海上目标选择打击法律原则复杂电磁环境下是否适用以及如何适用的问题进行了探讨

    youdao

  • The paper discusses the phenomena of the attack by ARP virus and its working principles, proposes testing and treating ways and introduces some currently popular defending methods.

    文章讨论ARP病毒故障现象作用原理给出了用户自检和处理方法介绍了目前比较流行的防御策略。

    youdao

  • To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.

    提高恢复水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测恢复的安全双水印算法。

    youdao

  • This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.

    基于MIX匿名系统模型,提出一种改进统计命中攻击算法,算法的基础给出基于填充防御策略

    youdao

  • This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.

    基于MIX匿名系统模型,提出一种改进统计命中攻击算法,算法的基础给出基于填充防御策略

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定