• 不难想象本文选择攻击类型范围广。

    The variety of attacks to choose from for this article was great, as you can imagine.

    youdao

  • 我们讨论了一些常见攻击类型这些攻击所带来的后果。

    We discussed some common types of attacks and the results that attackers can obtain.

    youdao

  • 四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    youdao

  • 描述常见网站安全攻击类型以及如何帮助阻止这些攻击

    Describes common types of Web-site security attacks and how to help prevent them.

    youdao

  • 贝叶斯分类模型入侵检测用于攻击类型分类有力工具

    Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.

    youdao

  • 也就是说它们只能很好的验证那些工具发行者已知攻击类型数量

    That is, the validation they perform is only as good as the number of attack vectors known to the publishers of the tool.

    youdao

  • 每个级别防范不同攻击类型提供攻击有效的屏障

    Each level tries to thwart different types of attacks and also provides more barriers to attackers.

    youdao

  • 说明常见网站安全性攻击类型利于避免受到攻击的方法。

    Describes common types of Web site security attacks and how to help prevent them.

    youdao

  • 四种主要分类中又一些不同的攻击类型稍后我们对它们进行介绍。

    There are several types of attacks within these four broad classifications, which we will look at in a minute.

    youdao

  • 对于每种技术适当的方块加上底纹表示这种技术有助于防范攻击类型

    The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.

    youdao

  • 另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    In another type of attack, the attacker might modify the stylesheet to hide information from users.

    youdao

  • 攻击类型技能消耗能量较少,防御类型的技能消耗大量的能量。

    The energy bar has been designed to be favorable to use offensive skills and less favorable to use defensive skills. Tactically moving out of combat can drain energy quickly.

    youdao

  • 需要使用前面介绍针对不同攻击类型其他监视类型以及配置确保服务级协议兼容性

    Other types of monitoring for the types of attacks mentioned above are also needed, as well as configurations to ensure compliance with service-level agreements.

    youdao

  • 最近几年,网络上出现一种新的攻击类型:客户攻击攻击的对象是客户端应用程序。

    In recent years, there has been an increase of a particular type of attack: client-side attacks.

    youdao

  • 要点很多不同类型入侵者、很多不同入侵动机以及(我们后面将会的)许多不同的攻击类型

    The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.

    youdao

  • 这样可以防止恶劣攻击类型(入侵者可能使用内置管理基础设施恶意应用程序部署的桌面上)。

    This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.

    youdao

  • 很多不同类型入侵者、很多不同的动机,以及(我们后面将要讨论的)许多不同的攻击类型

    As you can see, there are many different types of intruders and motivations and, as we will discuss later, many different types of attacks.

    youdao

  • 其中有些攻击类型比较常见这些相同攻击类型会出现任何可以远程访问服务中(例如消息篡改)。

    Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).

    youdao

  • 传统入侵检测方法面对多变网络结构缺乏扩展性,而且在未知攻击类型面前缺乏适应性

    Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.

    youdao

  • 本文首先冗余事件关联特征进行系统分析包括攻击类型关联特征空间关联特征、时间关联特征。

    This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.

    youdao

  • 这些攻击类型危险因为它们要求技能很少,并且只要可用IP连接,就可以很远的距离实施攻击

    These types of attacks are the most dangerous because they usually require the least skill and can be done from a great distance as long as IP connectivity is available.

    youdao

  • 详细的攻击日志——HDIV记录检测到的每次攻击信息,信息包括:url用户名IP地址攻击类型

    Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.

    youdao

  • 这些攻击类型危险因为它们需要技能往往很少并且只要可用IP连接,就可以很远的距离实施攻击

    These types of attacks are the most dangerous, as they usually require the least skill and can be done from a great distance as long as IP connectivity is available.

    youdao

  • 针对无线传感器网络自身特殊性路由协议面临的攻击类型提出一个基于理论分布联合攻击检测模型(GADM)。

    To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    youdao

  • 恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    youdao

  • 论文研究入侵攻击类型主要大类,它们分别HTTP协议相关的典型入侵攻击,与TCP协议相关典型入侵攻击以及ICMP协议相关的典型入侵攻击

    There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

    youdao

  • 这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    This type of attack is only possible if the database or password store is already compromised.

    youdao

  • 这样可以防止某些类型攻击同时可能禁止某些合法文件请求带有非英文的文件。

    This can prevent certain types of attacks, but it may also block out requests for certain legitimate files, such as files with non-English names.

    youdao

  • 这种类型攻击不会造成信息泄露或者服务破坏的。

    These types of attacks do not result in data being stolen or servers being breached.

    youdao

  • 这种类型攻击不会造成信息泄露或者服务破坏的。

    These types of attacks do not result in data being stolen or servers being breached.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定