惡意攻擊 的英文怎麼說

中文拼音 [ěgōng]
惡意攻擊 英文
hostile attack
  • : 惡構詞成分。
  • : Ⅰ名詞1 (意思) meaning; idea 2 (心愿; 願望) wish; desire; intention 3 (人或事物流露的情態)su...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 惡意 : evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. However, proprietary source software vendors, in contrast, claim that secrecy is necessary to hinder malicious attackers, and that " peer review " is not practical because of the complexity of the source code

    但專利軟體供應商則持相反見,他們認為不公開源碼是必需的,因為這是抗禦黑客惡意攻擊的基本措施。
  2. No any argue and attack is allow in this forum

    不得於論壇內張貼惡意攻擊、漫罵。
  3. Comments : very erotic and very violence ' s vulgar news and pornographic pictures, malicious attacks female college students, induces crime

    上榜原因:很黃很暴力的低級新聞與黃色圖片,惡意攻擊女大學生,誘使犯罪。
  4. Ever since she took office, japan ' s " iron lady " has been the target of leaks from within her own foreign ministry, and vicious attacks in the japanese media

    自她就職后,這位日本的"鐵娘子"一直是外務省向外界透露的消息中的中心人物,也是日本媒體惡意攻擊的對象。
  5. The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit

    第二步是確定電腦黑客或者可能惡意攻擊的漏洞。
  6. Securing web services with acls, however, does not mitigate the risk of exposing web services and non - web services vulnerabilities to a malicious attack

    用訪問控製表保護web服務,然而,這並不能減輕web服務(以及非web服務)漏洞受到惡意攻擊的危險。
  7. Experimental results show that the proposed techniques have good imperceptibility and can survive of common image processing operations and jpeg lossy compression with high robustness. the second one considered the watermarking system as a special digital communication system and introduced the ecc as channel coding technique. by using the turbo coding technique, we are able to reduce the watermark bit error rate and improve the robustness of the watermark so as to make counterfeiting attacks more difficult

    本文在保證水印不可見性的基礎上和載體圖像的允許降質范圍內,利用rbf神經網路技術實現數字水印信息的最大強度嵌入以增強數字水印抵禦各種惡意攻擊的穩健性;在通信論和信息論模型基礎上,引入ecc (差錯控制編碼)技術降低水印的誤碼率,使得提取水印信息更加可靠,使可能的水印變得更加困難,從而獲得更好的水印穩健性和可靠性。
  8. Nasty put - downs, singling out individuals for vicious criticism, sneering, treating people with contempt and lack of respect - fergie turned it into an art form

    骯臟的奚落,單拎出某個人來惡意攻擊,冷嘲熱諷,以輕蔑和缺乏尊重的姿態對待別人弗格森把這簡直變成了一種藝術。
  9. Desx extended des was created by the cryptographic security firm rsa security as a modification of the standard des algorithm that supports additional key material, making the algorithm more resistant to brute force attacks than standard des

    Desx (擴展的des )是由加密安全公司rsa security在改進標準des演算法的基礎上創造的,由於該演算法支持更長的密鑰,因而比標準des演算法更能抵抗惡意攻擊
  10. Sql server browser should be run in the security context of a low - privileged user to minimize exposure to a malicious attack

    Sql server瀏覽器應該在低特權用戶的安全上下文中運行,以將受到惡意攻擊的幾率降到最低。
  11. Sql server browser should be run in the security context of a low privileged user to minimize exposure to a malicious attack

    Sql server瀏覽器應該在低特權用戶的安全上下文中運行,以將受到惡意攻擊的幾率降到最低。
  12. To avoid malicious attacks, the system provided are required to have id verification function and to prevent reproduction and protect intelligence property rights. a digital signature is required before the use of a service. the system should be able to track the invader and set up a blacklist

    要求提供的系統具有身份認證功能,以防惡意攻擊;享受服務要通過數字簽名,以防復制,保護知識產權;系統要能對侵入者進行追蹤,以便確定黑名單。
  13. Because of lacking of necessary management measures, private broadband lans are vulnerable both by the outer networks and the inner nodes, which result in the leak of important information

    由於缺乏必要的監管措施,專用寬帶網在受到外部網路的惡意攻擊的同時,來自內部的也逐漸增多,導致內部重要信息的泄漏。
  14. Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. this method need n ' t original image when the watermark is extracting. experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i. e. this method can detect the tampered portions

    因此,本文利用小波系數均值來嵌入水印,提出了一種基於小波域的圖像完整性驗證的半脆弱水印演算法,在魯棒性和脆弱性方面達到了很好的平衡,對非惡意攻擊有很強的魯棒性,而對于的篡改操作有很強的識別和定位能力。
  15. At the same time, the draw back of tcp / ip protocol is a main source of unfair flow and vicious attack

    另一方面, tcp ip的缺陷也成為不公平數據流或惡意攻擊數據流產生的重要原因。
  16. To prevent buffer overruns and malicious attacks, your code should always verify user input content and length

    為防止緩沖區溢出和惡意攻擊,代碼應該始終驗證用戶輸入的內容和長度。
  17. The protocol uses hmac to guarantee the client being active, then protects leasing from attacks

    該協議靈活運用hmac ,確保代理每次租借時客戶總是「激活的」 ,從而盡量避免惡意攻擊
  18. The first step is to identify critical system assets - intangible or tangible - that are vulnerable to malicious attacks

    第一步是確定易遭到惡意攻擊的關鍵系統資產無形的或者有形的。
  19. For example, during the summit, the apec mirror site recorded 330, 000 visits in total and suffered 295, 000 malicious attacks

    如apec鏡像網站會議期間總訪問量33萬次,受到各類惡意攻擊就達到了29
  20. Or, if your organization isn ' t that large, but it is a " rich " target in other respects, you have to expect malicious attacks

    或者,如果你的組織不大,但是在其它方面它是一個值得的目標,你只能預料惡意攻擊
分享友人