攻擊原則 的英文怎麼說

中文拼音 [gōngyuán]
攻擊原則 英文
attack doctrine
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ形容詞1 (最初的; 原來的) primary; original; former 2 (沒有加工的) unprocessed; raw Ⅱ動詞(原...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. More broadly, the free software movement saw the deal as an attack on one of its core tenets

    另外,免費軟體行動將其視為對其核心
  2. Under the pre - emption doctrine, touted by the bush administration, an enemy that is in the process of acquiring weapons of mass destruction can be attacked before using those weapons

    布希政府聲稱,根據預防性,擁有大規模殺傷武器的敵人在使用這些武器前就可以被
  3. Under current international law, the victim state should meet four requirements in exercising the right of self - defense. first, there should be actual armed attack ; second, the action of self - defense should be necessary and proportionate ; third, the un security council has not taken necessary action to maintain international peace and security, and ; forth, the victim state should report to the security council immediately about the action it has taken to defend itself

    行使自衛權必須滿足四項要求:一是遭受實際發生的武力並且該武力針對的是受害國的領土或該國的海陸空部隊;二是符合必要性和相稱性;三是聯合國安理會尚未採取必要措施以維持世界和平與安全;四是受害國必須立即就其採取的自衛行動向安理會報告。
  4. The above points serve to explain the first of the strategic principles of guerrilla warfare, the principle of using initiative, flexibility and planning in conducting offensives within the defensive, battles of quick decision within protracted war, and exterior - line operations within interior - line operations

    上面所說的各點,說明了游戰爭戰略的第一個問題? ?主動地、靈活地、有計劃地執行防禦中的進戰,持久中的速決戰,內線作戰中的外線作戰。
  5. Then the detection probability of a distributed parallel detection system that consist of multiple distributed detectors is given. ( 2 ) the path planning is studied according to the attacking and the reconnaissance / surveillance mission task requirements

    ( 2 )本論文對無人機的任務,特別是偵察監視任務進行了分析和研究,根據作戰效能評定提出了合理的航路評價指標,簡便易行,適于實際計算。
  6. The author of this essay believes that only if a terrorist attack constitutes armed attack, the victim state has the right to do so. the victim state should strictly observe all the four requirements mentioned above. the targets should be limited to the terrorist group which carried out the terrorist attack and the state ( states ) which goaded, directed, controlled or tolerated the terrorist attack

    此外,本文認為受害國有權在恐怖主義行動構成武力的情況下對其行使自衛權,但是受害國應向國際社會提供確鑿的相關證據並應嚴格遵守必要性和相稱性,並且對恐怖主義進行自衛的對象應限於實施了構成武力的恐怖主義行動的恐怖主義組織以及指導、控制、唆使或縱容該恐怖主義行動的國家。
  7. You need to plan for security during the design phase of the project, as well as plan how security will be maintained over the lifetime of the application

    因此,必須確保用戶輸入不會插入到已在執行的命令。遵守這些可以幫助您抵禦sql注入式
  8. A basic principle of security hardening is to minimize the attack surface for potential attacks

    安全性加強的基本是使潛在面最小化。
  9. How it works : instead of hilling a tumor with large beams of radiation from only a few directions, as is done with conventional radiotherapy, peacock calculates precise angles and dosed using a computer and ct scan

    工作理傳統的放射治療是從幾個方向用大量的放射性光束來腫瘤,而「孔雀』是用計算機和ct掃描儀計算出腫瘤的精確角度和輻射吸收劑量。
  10. Please do not defame, threaten, abuse or discomfort upon another participant, user, or other individual. we keep the right to delete any information considered to be unlawful or violation

    請遵守網路禮節,勿詆毀、恐嚇、毀謗、人身、一文多貼,如違反上述,本版管理員有權立即刪除。
  11. We employ data from darpa ' 98 to train and test feasibility of our proposed model. from the results of our experimental on the network data, our model achieves high detection rate on average, and low false alarm rate for five typical types of attacks

    通過實驗我們發現,決策樹演算法根據信息增益的理,可以精確地從這兩類的內容特徵中提取,因此對r2l和u2r類有較高的檢測率。
  12. Ultimately, the doctrine allowing pre - emption of long - term threats has the potential to be enormously destabilizing

    從根本上說,這一允許對長期威脅進行預防性本身是非常不穩定的。
  13. Because there is lots of encrypt algorithm in the world, this paper elaborates the core idea, the theory of several algorithm that are more popular at present, and analyzes the resist - cipher - attacking ability of the main algorithm adopted in this applying system

    由於目前國際上的加解密演算法多種多樣,而且比較復雜,因此,本文對其中流行的幾種加密演算法的核心思想、理以及選擇進行了對比,對本課題採用的主要加密演算法的抗密碼分析能力也進行了剖析。
分享友人