攻擊向量 的英文怎麼說

中文拼音 [gōngxiàngliáng]
攻擊向量 英文
vector of attack
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 量動1. (度量) measure 2. (估量) estimate; size up
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Compared with classical cryptanalysis, power anlaysis attacks need less time and fewer money. it is widely used in cryptosystem

    一經提出,便受到人們的廣泛關注,在此方的研究也層出不窮。
  2. Denial of service attacks ( dos ) use a networked computer or computers to bombard another networked computer or server communication traffic with the intention of disrupting or rendering the latter inoperable, or enabling unauthorized access

    妨礙信息傳送的是利用一部或多部聯網電腦連珠炮發地另一部聯網電腦或伺服器傳送大資料,意圖擾亂其運作、令其無法運作或擅自接達。
  3. Friday took his aim so much better than i, that on the side that he shot, he kill d two of them, and wounded three more ; and on my side, i kill d one, and wounded two : they were, you may be sure, in a dreadful consternation ; and all of them, who were not hurt, jump d up upon their feet, but did not immediately know which way to run, or which way to look ; for they knew not from whence their destruction came : friday kept his eyes close upon me, that as i had bid him, he might observe what i did ; so as soon as the first shot was made, i threw down the piece, and took up the fowling - piece, and friday did the like ; he see me cock, and present, he did the same again ; are you ready, friday

    他手裡一拿到武器,就彷彿滋生了新的力,頓時就他的仇人們撲過去,一下子就砍倒了兩個,並把他們剁成肉泥。因為,事實上,我們所進行的這場實在太出乎他們的意料之外了,這班可憐的傢伙給我們的槍聲嚇得東倒西歪,連怎樣逃跑都不知道,就只好拿他們的血肉之軀來抵擋我們的槍彈。星期五在小船上打死打傷的那五個,情形也一樣。
  4. Proficient martial blood pires boys, and build the competent powers girl mao, believe that the majority of male compatriots have long been a candidate. it figures it can be the top choice of the name of the corresponding role, games started. the players task is very simple, that is, to screen the bad guys were all overthrown, and the school has a calm, control key figu

    游戲的難度可謂非常之低,玩家只需要對準壞人不斷按動空格鍵,隨后順著箭頭指示的方前進即可,畫面下方,能槽之上的是玩家的體力槽,一旦被壞人便會減少,全部扣完的話游戲結束,不過相信這樣的情況很少發生,畢竟我們還有華麗的必殺呢!
  5. Oh, i used to operate guide : key control, a ordinary artillery attack

    操作指南:方鍵控制, a普通炮彈, s超能彈視野范圍內全滅
  6. Oh, i used to operate guide : key control, a ordinary artillery attack ! 4455 energy emergency games

    操作指南:方鍵控制, a普通炮彈, s超能彈視野范圍內全滅
  7. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反追蹤演算法的基礎上,著重研究了代數方法編碼反追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos過程中的反追蹤問題的一種新的解決方法; ddos陷阱作為反追蹤的工具,引誘者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos體系結構;基於源的ddos防禦方法作為反追蹤有用的補充,將防禦系統部署在源網路,通過監控雙檢測和限制速率終止來自源的;基於後倒推的防禦ddos的路由機制把ddos看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于的包,通過後倒推上級路由器也得到通知而把這樣的包丟棄。
  8. The research and development for the bump orbit injection system with four kicker magnets centralized in nsrl phase project, and research of some key techniques were summarized, including micro - second pulse ferrite kicker magnet, coated ceramic chamber, measurement device for loss impedance, bpm calibration system, etc

    摘要介紹了國家同步輻射實驗室二期工程改造中四沖磁鐵集中布局凸軌注入系統研發過程,以及對若干關鍵技術的關,包括微秒脈沖鐵氧體沖磁鐵研製,鍍膜陶瓷真空盒研製,縱阻抗測裝置研製, bpm標定裝置研製等。
  9. How it works : instead of hilling a tumor with large beams of radiation from only a few directions, as is done with conventional radiotherapy, peacock calculates precise angles and dosed using a computer and ct scan

    工作原理傳統的放射治療是從幾個方用大的放射性光束來腫瘤,而「孔雀』則是用計算機和ct掃描儀計算出腫瘤的精確角度和輻射吸收劑
  10. Lastly, the popularity and trust respect of friendship quality can versus predict two aggressive behaviors. furthermore, the predictive ability of the former is higher than that of the latter

    受歡迎程度和友誼質中的信任尊重維度能反預測兩類行為,但受歡迎程度的預測能力更強。
  11. Ffars can be used effectively in any quantity required, from a few rockets fired at a single target to an entire barrage being placed on an area target

    機載折翼火箭可任意選擇投射,既可單個目標發射數枚,又可集群目標進行密集彈幕
  12. According to features of the s and p layers, ability which rijndael algorithm has to resist against differential cryptanalysis and linear cryptanalysis is theoretically discussed, and the principle of square basic attack and two kinds of extension attacks are discribed on the basis of the characteristics of oriented - byte of rijndael algorithm

    根據s層和p層的性能,從理論上定討論了rijndael演算法抵抗差分密碼和線性密碼的能力。同時,基於rijndael演算法面位元組結構的特點,闡述了square基本及其兩種擴展的原理。
  13. The lower right corner of the screen long said ninjas energy bay fill, press and hold the key, or can be powerful special attacks

    畫面右下方的長條表示忍者的能槽,加滿之後,按住方鍵「上」或「下」可以進行威力強大的特殊
  14. A security issue has been identified in the way vector markup language is handled that could allow an attacker to compromise a computer running microsoft windows and gain control over it

    現在已經證實在標記語言vml的處理方式中有一個安全性問題,可以讓者用以侵入執行microsoft windows的電腦,並取得該電腦的控制權。
分享友人