• CSRF攻击过程中的请求响应序列如 图1

    The sequence of requests and responses during a CSRF attack is illustrated in Figure 1.

    youdao

  • 十几青少年可以成为父母青少年情感攻击过程

    The teenage years can be an emotional assault course for parents and teenagers.

    youdao

  • 针对事后入侵响应,提出了一种基于引理推理攻击过程分析方法

    Based on abduction inference, a method of network attack process analysis for incident response was designed.

    youdao

  • 这些攻击甚至提供它们自己的匹配工作负载,以便攻击过程更加容易。

    These exploits even come with their own matching payloads to make the process that much easier.

    youdao

  • 如果保持存储量不变,改进攻击过程需要大约2127加密运算

    When the same memory is used as GilbertMinier's attack, the time complexity is about 2127 encryption operations.

    youdao

  • 渗透测试模型是渗透测试关键技术,但现有的渗透测试模型难以模拟网络攻击过程

    Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.

    youdao

  • 信息攻击过程主要通过影响信息传输子系统指挥控制子系统来影响整个作战系统效能

    Information attack impacts on whole combat effectiveness mostly by impacting on information transmission and command control subsystem.

    youdao

  • CSRF攻击过程中,请求源自入侵第三方站点通过一个已验证的浏览器页面传递服务器

    During a CSRF attack, requests originate from an intruding third-party site and are passed through an authenticated browser page to the server.

    youdao

  • CSRF攻击过程中,请求来自入侵者站点,然后通过一个经过验证浏览器页面传输服务器

    During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.

    youdao

  • 研究表明,入侵场景可提供较高层次抽象表示攻击过程但是已有研究方法无法在线生成入侵场景。

    Researchers use intrusion scenarios to describe complicated attack procedures at a high abstract level, while, to our best knowledge, none is able to produce the scenarios online.

    youdao

  • 最后仿真实验模拟了现实环境恶意用户攻击过程测试信誉模型防御SPIT攻击性能情况

    At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.

    youdao

  • 给出一个网络攻击模型模型将攻击过程归纳若干阶段详细地分析了黑客阶段采用技术方法。

    This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    youdao

  • 整个攻击过程中,Twitter一直更新自己状态博客,告诉人们Twitter服务状态,但是没有提到API

    Throughout the attack, Twitter has updated their Status Blog with notes about the service itself, but nothing about the API.

    youdao

  • 完整攻击过程通常会包括一系列单独的攻击行为每个攻击行为某个系统漏洞(脆弱性)的一次利用

    A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.

    youdao

  • 介绍了空战中超视距目标攻击过程分析了多目标攻击过程工作时序,及火控雷达对空空导弹截获概率的影响

    The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.

    youdao

  • 利用漏洞对系统进行攻击成为了黑客们惯用本文针对管理员账号口令一安全漏洞,采用了一些基本攻击方法,详细描述了具体地攻击过程

    In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.

    youdao

  • 因此通过应用告警相关方法开发入侵检测系统的协作模块通过分析关联告警产生清晰的攻击过程描述,通过生成综合告警来减少告警数量提高检测效率非常必要。

    So, it's necessary that apply alert correlation methods develop several IDS coordination modes to analysis alerts and build distinct attack scenarios and reduce the volume of false alerts.

    youdao

  • 不一致问题项目中出现时开发过程就变成存储库每个人都从中寻找他们自己辩护攻击其他人的东西。

    When issues of noncompliance arise on a project, the development process becomes the repository to which everyone looks for defending their position or for attacking someone else's.

    youdao

  • 提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击时是多么不堪一击

    The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    youdao

  • 一旦攻击开始网站可以尝试追踪突发洪水般的流量找到计算机对此加以过滤一个复杂过程

    Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.

    youdao

  • 我们联合追求过程并非一种生硬攻击而是多样化多管齐下方式

    The course we are jointly pursuing is not a blunt assault, but a diversified multi-pronged approach.

    youdao

  • 所有生物组织中的DNA都处于高度活跃化学物质辐射不停攻击之下而且DNA复制过程经常出错

    The DNA in all organisms is under constant attack from highly reactive chemicals and radiation, and errors are often made when it is copied.

    youdao

  • 美国国防部官员否认有关报导这些报导说,巴基斯坦军人星期天晚上向据称攻击一个激进分子基地过程侵犯了巴基斯坦领空美国直升机射击。

    Pentagon officials deny news reports that Pakistani soldiers fired at two U.S. helicopters late Sunday for allegedly violating Pakistan's airspace in a suspected attack on a militant base.

    youdao

  • 航母空中军事行动所有海军军事行动中具挑战性最为苛刻——之所以这样说,是因为曾亲眼目睹林肯攻击航母上飞机着陆和弹射起飞的过程

    Carrier air operations are the most challenging and demanding of all naval operations — as I saw firsthand when landing and was catapulted off the attack carrier USS Abraham Lincoln.

    youdao

  • 相反,只动物都是在遵循数千对此饿狼攻击过程中所培养出来的简单法则

    Instead each animal was following simple rules evolved over thousands of years of Wolf attacks.

    youdao

  • 胸腺里T细胞必须经过淘汰过程,才能阻止有可能攻击自身组织(这些组织细胞表面表达的是自身蛋白)的T细胞发育成熟。

    There they undergo a selection process designed to weed out cells that might attack the body’s own cells (which display pieces of human proteins on their surface).

    youdao

  • LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    youdao

  • 防止服务抵赖攻击(denial of service attack):使用XKMS获取密钥信息比较有用,前提是XKMS在需要时候可用并且这一过程能在合理时间完成。

    Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.

    youdao

  • 利用缓冲区溢出进行攻击可以改变这个过程并且允许黑客执行任何他们期望函数

    Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.

    youdao

  • 需要有机动性过程过程容易适应新发现适应几个主要风险原型方案造成攻击一定程度上的不确定性并且建立早期粗糙工件

    You need maneuverable processes that easily adapt to discovery and accommodate a degree of uncertainty to attack a few major risk items, prototype solutions, and build early and coarse artifacts.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定