• This defense-in-depth model begins with technologies as the foundation using the following examples

    深度防御模型使用以下示例作为技术基础

    youdao

  • "Defense against malicious adversaries is an inherently difficult problem," said Partha Pal, APS principal investigator at Raytheon BBN Technologies, in the statement.

    雷声bbn技术公司的首席研究员ParthaPal声明中说:“恶意对手防御注定一项艰巨的任务。”

    youdao

  • As for Honeypot system, it is one kind of trick technologies based on active theory of defense.

    蜜罐系统基于主动防御理论诱骗技术

    youdao

  • Low observable small target detection, recognition and tracking algorithms are key technologies to extend the acceptance distance of guidance system and enhance the capacity of defense system.

    信噪()比条件下运动点目标检测跟踪识别技术扩展制导武器系统作用距离加强系统防御能力关键技术之一。

    youdao

  • On the defense side, current technologies are still unable to withstand large-scale attacks.

    攻击防范角度来说现有技术仍然不足以抵御大规模攻击

    youdao

  • Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VI.

    传感器命令控制智能C3I祖国安全防卫技术VI

    youdao

  • Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VI.

    传感器命令控制智能C3I祖国安全防卫技术VI

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定