傀儡成分 的英文怎麼說

中文拼音 [guīlěichéngfēn]
傀儡成分 英文
dummy filler
  • : 傀構詞成分。
  • : Ⅰ動詞1 (完成; 成功) accomplish; succeed 2 (成為; 變為) become; turn into 3 (成全) help comp...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • 傀儡 : puppet
  1. In 1935 japan ' s militarists continued their aggression : the puppet regime of east hopei was set up, part of chahar was annexed, and demands were made for the separation of north china from the south, to which nanking partly acquiesced

    但是, 1935年日本軍國主義者繼續進行侵略,立了冀東政權,并吞了一部察哈爾,提出了華北脫離南方的要求,對此,南京已經默認了一部
  2. We degenerate into hideous puppets, haunted by the memory of the passions of which we were too much afraid, and the exquisite temptations that we had not the courage to yield to.

    我們退化醜陋的,經常回憶我們曾經十害怕的激情和我們沒有勇氣對之屈服的絕妙的誘惑。
  3. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己功與所需的主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
分享友人