go top

vector of attack

  • 攻击向量

网络释义专业释义

  攻打向量

... tunnel 保险加密链路 vector of attack 攻打向量 Virtual directory 虚目录 ...

基于16个网页-相关网页

  袭击向量

... tunnel 平安加密链路 vector of attack 袭击向量 Virtual directory 虚目次 ...

基于1个网页-相关网页

  进攻向量

... tunnel 安定加密链路 vector of attack 进攻向量 Virtual directory 虚目次 ...

基于1个网页-相关网页

短语

vector r of attack 攻击向量

  • 攻击向量

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句权威例句

  • Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.

    考虑示例1 (a),当然改写Windows攻击,它构成此类攻击载体基础

    youdao

  • It helps to recognise what attack vector take into account and then you can choose the right method of protecting the key.

    有助于识别什么攻击矢量考虑然后可以选择正确方法来保护密钥

    youdao

  • One attack vector is the installation of a malicious driver.

    一种攻击导向恶意驱动程序安装

    youdao

更多双语例句
  • For example, even though a Nuke would cause ninety billion dollars in destruction the probability of this type of attack is so low that it creates a vector value below the benchmark needed to consider it a daily threat.

    FORBES: Connect

  • The researchers showed how to get round the limited computational abilities of the smart tags to use them as an attack vector and corrupt databases holding information about what a company has in storage.

    BBC: NEWS | Technology | Viruses leap to smart radio tags

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定