• 攻击技术一些特点

    Some characteristics of attack techniques.

    youdao

  • 图像水印算法设计攻击技术互相促进对立面

    The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    youdao

  • 攻击技术比赛攻击以旋为主攻击为辅

    Attack skill: The main attack was turning kick in competition. The auxiliary attacks were back kick and front kick.

    youdao

  • 论文MD5算法攻击技术进行深入分析研究。

    Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.

    youdao

  • 本文介绍木马攻击原理、常用攻击技术以及防范策略

    This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    youdao

  • 攻击浪费了他们时间糟糕的是,揭示了他们的攻击技术

    The attacker has wasted their time and, worse, revealed their attack techniques.

    youdao

  • 主要方式网上教授病毒木马制作技术各种网络攻击技术

    Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    youdao

  • 此外,结 合可能细微先验知识限制提出了有限攻击技术

    The limited blind interference technology is presented in terms of no subtle priori knowledge.

    youdao

  • 为了提高检测技术检测设备水平首先攻击技术非常深入的了解

    In order to improve the level of detection technology and testing equipment, we must first have a deep understanding of the attack technology.

    youdao

  • 这里我们对僵尸网络,普遍攻击技术以及涉及到的个人一个更贴近观察

    In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    youdao

  • 为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    youdao

  • 该文提出了基于木马漏洞扫描模型攻击原理以及关键攻击技术实现作了进一步研究

    This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.

    youdao

  • 首先智能卡安全攻击主要方法进行了研究,分析了几种最新的智能卡攻击技术原理关键步骤

    At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.

    youdao

  • 信息安全核心技术在于攻防”,即攻击技术防御技术只有掌握攻击技术才能更好做到安全防御。

    The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    youdao

  • 攻击技术涉及到、左刺拳、左钩拳上钩拳、右交叉以及组合拳,1 - 2连击的组合拳

    Punching involves quite a few skills, such as the straight left, the left jab, the left hook, the right uppercut, the right cross as well as the combination punching like the one-two.

    youdao

  • 入侵检测信息安全领域一个挑战性课题,其中重要的原因是入侵检测所面临是极富智慧攻击技术

    Intrusion detection is a real challenge in the area of information security. The reason is that it faces the most intelligent hackers.

    youdao

  • 论文信息隐藏方面主要工作就是围绕两种应用展开,内容涉及图像乱、图像信息隐藏隐藏分析和攻击技术等方面。

    In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.

    youdao

  • 自然而然披上杀死技术”的铠甲准备这个混蛋发起嘹亮难以理解攻击

    I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.

    youdao

  • 但是可以运用以下技术防止ARP攻击

    But you can help prevent ARP attacks using the following techniques.

    youdao

  • 这项攻击单个基因技术也许会催生应对75%缺乏任何特殊疗法癌症基因药物,包括其他疾病

    The technique's ability to attack single genes could lead to drugs for the 75 percent of cancer genes that lack any specific treatment, as well as for other illnesses.

    youdao

  • 人类邪恶一面使得有人滥用计算机技术实施攻击入侵,那么就是试图破坏计算机系统

    That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.

    youdao

  • 演习模拟了一次协同网络攻击,目标是信息技术通信化学交通系统设施

    The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

    youdao

  • 有一个女人曾经使用类似MITM攻击技术抢劫很多的很多(请参阅参考资料)。

    A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).

    youdao

  • 然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍都认识不清

    Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    youdao

  • 了解了密码破解者如何在内部外部使用技术攻击基础结构

    You also saw how password crackers use techniques both internally and externally to your infrastructure.

    youdao

  • 每天使用不同工具技术攻击网上银行

    He USES different sets of tools and techniques everyday to target an online bank.

    youdao

  • 为了帮助这些技术刚才提到攻击类别联系起来,我们使用以下图形解释各种技术

    To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.

    youdao

  • 为了帮助这些技术刚才提到攻击类别联系起来,我们使用以下图形解释各种技术

    To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定