• Scholars from various backgrounds got involved in the security studies from different perspectives.

    理论背景各异学者们也开始各自不同的视角出发,着手研究安全问题。

    youdao

  • Paul Kennedy is Dilworth professor of history and director of international security studies at Yale University.

    保罗·肯尼迪:帝尔沃斯历史学教授耶鲁大学国际安全研究负责人

    youdao

  • An analyst with South Africa's Institute for Security Studies, Judy Smith-Hohn, says as a result the campaign was short though heated.

    南非安全问题研究所分析员霍恩说,这场选战因此短暂而激烈的。

    youdao

  • Thanks to Paul Pillar, director of graduate studies at Georgetown University's Center for Peace and Security Studies and a former CIA intelligence officer.

    此特别感谢美国乔治敦大学和平安全研究中心研究生主任,中情局前情报员皮拉尔·保罗对本文的支持。

    youdao

  • The signature scheme can verify the authenticity, integrity and undeniableness of a document, and signature scheme is the important content that information security studies.

    签名计划可以用来验证身份真实性文档完全性不可否认性,信息安全研讨主要内容

    youdao

  • "Nuclear facilities in Japan... were built to withstand earthquakesbut not an 8.9 earthquake," said James Walsh, a CNN contributor and research associate at MIT's security studies program.

    日本设施……为了经受地震而建的——不是8.9级地震。”CNN供稿人麻省理工学院安全研究项目副研究员JamesWalsh

    youdao

  • Studies have shown that farmers in developing countries who have achieved certain levels of education, wealth, and security of land tenure are more likely to adopt such technologies.

    研究表明发展中国家拥有一定教育水平财富土地所有权保障农民有可能采用这类技术

    youdao

  • The U.S. has been smart, ” said Carlyle A. Thayer, a professor at the Australian Defense Force Academy who studies security issues in Asia.

    美国已经变聪明了,”澳大利亚国防大学研究亚洲安全问题教授卡莱尔·塞耶

    youdao

  • Studies on world food security estimate that an affluent diet containing meat requires up to 3 times as many resources as a vegetarian diet9.

    世界食物安全研究评估到:一个富含饮食需要资源素食3

    youdao

  • "Huawei has transparency problems" said James A.Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.

    华盛顿战略和国际研究中心网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”

    youdao

  • "Huawei has transparency problems," said James A. Lewis, a cyber-security expert at the Center for Strategic and International Studies in Washington.

    华盛顿战略和国际研究中心网络安全专家詹姆斯•a刘易斯说:“华为存在透明度问题。”

    youdao

  • "Huawei has transparency problems" said James A. Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.

    华盛顿战略和国际研究中心网络安全专家詹姆斯•a刘易斯说:“华为存在透明度问题。”

    youdao

  • The problem, though, is "there's nothing that everyone agrees on," said James Lewis, cyber-security expert at the Center for Strategic and International Studies in Washington.

    不过问题“无法人人能达成共识,”詹姆斯·刘易斯(James Lewis)如是说,他是总部位于华盛顿的“战略国际研究中心网络安全专家

    youdao

  • The launch of the Common European Security and Defence Policy (CESDP) is a decisive measure in European integration which would provide a new field for studies on European integration.

    共同安全防务政策启动欧洲一体化进程中的个突破性举措,欧洲一体化研究因此增加了一个新的视点。

    youdao

  • This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.

    本文讨论嵌入式系统安全设计面临挑战以及受到攻击方式,探讨了如何弥合安全处理的资源缺陷抵抗攻击的方法。

    youdao

  • What this thesis studies is to protect the security mining method under the condition of thickness collapsible loss.

    本文研究就是湿陷性黄土层条件保护地表安全开采方法

    youdao

  • This thesis primarily studies the construction of full-scale information security framework of the Agriculture Bank of China.

    论文从农业银行总行角度来研究全国农业银行一级分行网络安全建设

    youdao

  • Our studies are not merely a theoretical discussion. Whatsmore, they give some new perspective on funds operation, analysis and evaluation in China's security markets.

    本文研究不仅理论上探讨,更重要的是,它中国证券市场基金运作研究评价引入了一种新的视角

    youdao

  • This dissertation studies how to build trust model for grid computing in order to find out malicious users and improve security and reliability of system.

    本文研究如何网格计算建立信任模型排除内部恶意节点,提高系统安全可靠程度。

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • Based on the research survey of the herd behavior in security markets, the author empirically studies the herd behavior in China stock market and theoretically analyzes the occurrence mechanism of it.

    本文主要证券市场羊群行为研究现状进行综述基础,对中国股票市场上的羊群效应进行实证研究对其发生机制进行理论分析

    youdao

  • The exercise "is designed to send China a message that Vietnam refuses to be pushed around, " said Ian Storey, a regional security analyst with the Institute of Southeast Asian Studies in Singapore.

    伊恩。斯道瑞新加坡东南亚研究学院地区分析人士,他说本次演习“旨在中国发出一种信号越南拒绝任人摆布。”

    youdao

  • This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).

    本文概述了目前安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。

    youdao

  • Recent studies indicate abroad, security from bike-helmet, seems to be too overrated.

    最近国外有相关研究指出安全帽带给骑士的安全保护似乎过于高估了。

    youdao

  • This thesis analyses and studies the legal adjustment of security market internationalization according to the transverse and vertical comparison.

    本文旨在通过证券市场国际化纵向横向比较,我国证券市场国际化的法律调整进行了分析研究

    youdao

  • The thesis argues the principle of OTP and studies the implementation of it in security system by introducing an OTP authentication system based on message digest.

    本文论述一次性口令认证基本原理,提出了一种基于信息摘录的认证模型,由此讨论了一次性口令认证安全系统中的

    youdao

  • However, Chinese experts on international studies warn that the strengthening of the US-Japanese alliance is targeted at China and would further complicate the nation's security environment.

    中国国际问题专家则警告说,美日加强联合针对中国的,对使国家的安全环境更加复杂化。

    youdao

  • Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.

    针对一个接收者基于身份方案,从签密方案安全属性入手分析安全性

    youdao

  • Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.

    针对一个接收者基于身份方案,从签密方案安全属性入手分析安全性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定