攻擊機制 的英文怎麼說
中文拼音 [gōngjījīzhì]
攻擊機制
英文
aggressive mechanism- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 機 : machineengine
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
- 機制 : 1 (機器製造或加工的) machine processed; machine made 2 (機器的構造和工作原理; 有機體的構造、功...
-
Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn
蓖麻毒素進入細胞的機理不甚明了,一般認為是rtb先與細胞膜受體結合,主要經過受體介導的內吞作用進入吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位進入細胞漿,在胞漿內攻擊核糖體,從而抑制蛋白質的合成,導致細胞死亡。2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems
2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。In the french air force, mirage 2000 fighters in operation are : mirage 2000c / b single seater and two seater for air defence ; mirage 2000n, two seater, designed for all weather nuclear penetration at low altitude and very high speed ; and mirage 2000d, which is an upgraded version of the mirage 2000n, for automated bombing using conventional and laser guided munitions ; e type for multi purpose exporting version ; r for single seat day / night eaporting version
在法國空軍內,現役的幻影2000戰斗機為幻影2000c型單座戰斗機、 b型雙座戰斗教練機、幻影2000n雙座全天候低空高速核攻擊機以及其改進型d型常規精確制導武器攻擊機、幻影2000e多任務出口型、幻影2000r單座晝夜偵察出口型。Trojan horse attack mechanism analysis and preventive measures
基於木馬攻擊機制的防範措施剖析Without the permission of you, we will not offer your materials to others, but unenclosed the influence by hacker s attacking, computer virus invading or government control, etc
在未經您同意之前,本站不會把您的資料提供給他人。但不包括黑客攻擊計算機病毒侵入或政府管制等不可抗力造成的影響。Operations guide : control keyboard and move around the space bar attack from the air drops random items temporarily give you different capacity
操作指南:鍵盤控制左右移動,空格鍵攻擊,從空中隨機掉下的物品,可暫時賦予你不同的能力The main content of this thesis is about a simulation of tracking a spot and attacking a target with ir imaging guidance missiles, which includes the establishment the math modeling, the production of the dynamic images by programming, and the use of the broadcast memory sbs technique to accomplish the real - time transmitting of ir image and real - time synthesizing of ir image
本文論述紅外成像制導導彈跟蹤並攻擊飛機目標的模擬全過程,建立數學模型,用編程的方法生成目標的動態紅外圖像,利用共享內存光纖網路完成圖像的實時傳送和實時合成。The mission assignment between the multi - uav. to the multi - uav system, the main problem is the cooperative of multi - uav. this includes the coordination of the arrival time, the attacking direction and the tasks assignment
對多無人機系統來說,最主要的問題是各無人機之間的「協調」問題,即多架無人機的航路(包括時間和攻擊方向等的限制)和任務的協調。Avionics self - protection system is a subsystem of the advanced avionics system, which has the main functions to find hostile radar - guided weapons system and infrared - guided weapons system by using the mothed of radar reconnaissance. and then to countermeasure enemy ' s radar - guided weapon system and infrared - guided weapons system by adoptinging those measures of electric - magnetic jamming ( active countermeasures ), chaff cloud deception jamming ( passive countermeasures ) and ir decoy deception jamming ( passive countermeasures ) so as to protect our airplanes from the hostile attacks this paper have researched deeply for the integrated mode of avionics self - protection system
航空自衛系統是先進航空電子綜合化系統的一個分系統,其主要功能是通過雷達偵察方式發現敵方雷達制導武器系統和紅外製導武器系統,並通過實施電磁干擾(有源干擾) 、箔條雲欺騙式干擾(無源干擾)和紅外誘餌欺騙式干擾(無源干擾)對抗敵方雷達制導武器系統、紅外製導武器系統,保護我機免受敵方武器系統攻擊。The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system
濾過性病毒攻擊人體的基本機制是病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。Simulation studies show that the proposed law in this paper has better guidance accuracy and better dynamic property during pursuit - control processing and it is superior to proportional navigation
模擬結果表明,給出的導引律在攻擊機動目標時制導精度高、脫靶量小,導引控制過程具有良好的動態性,性能明顯優于傳統的比例導引律。Legendary single version of flash, one of the very tough small games, mouse control movement and attack, hematemesis recommended
傳奇的單機flash版,非常強悍的一款小游戲,鼠標控制移動和攻擊,吐血推薦!They research and develop priorities for integrated strike warfare, maritime and land air superiority, strike fighter employment, airborne battle management, combat search and rescue, close air support, and associated planning and support systems
他們研究了綜合打擊作戰的優先目標、海上及陸上制空、戰斗攻擊機運用理論、空降戰役管理、戰斗搜索與救援、近距離空中支援等作戰理論,並發展出了相關的規劃支持系統。The last of planes were attackers carrying bombs and guided conventional munitions
最後一批起飛的是攻擊機,他們載著普通炸彈和常規制導導彈。Fourthly, we discuss and simulate the transformation method of relative parameters of ground target based on data link. and then we analyze decision algorithm of air - to - ground attack. especially, we educe three dimensional terminal guidance law of air - to - ground missile in the disturbance of wind, and give the simulation result
本文也研究了空對地攻擊的若干技術,包括對獲得數據鏈指揮下地面目標相對于某攻擊機當前時刻相關參數的方法進行了闡述及模擬,並在此基礎上討論了單機對地面多個目標的攻擊決策演算法,同時提出了一種風干擾下空地導彈的三維末制導導引律,且利用數字模擬進行了驗證,並指出研究空地導彈導引律時考慮風影響的必要性。Several mechanisms are provided to assure the system security based on the ultrakernel. separation, multilevel, hardware based access control and code error tolerance mechanisms are well integrated. ( 3 ) a developing platform and a firewall system prototype
整體採用可生存設計;在系統設計時加入了抗緩沖區溢出攻擊機制和對抗dos攻擊機制;設計了一種容忍代碼錯誤的機制,另外還採用隔離與分級機制,並對blp模型進行改進應用。In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information
在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。Confidential data include file and the control block used to manage the file transfer
免受攻擊,機密數據包括文件以及管理文件傳送的控制塊。The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality
Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。To overcome the shortages of the traditional proportional guidance in attacking maneuvering targets, the paper firstly established the relative motion models for the anti - ship missile and the target in three dimensions, then based on the optimal guidance law for aiming at non maneuvering targets and the sliding - mode control theory, the optimal sliding - mode guidance law in three dimensions, which was more easily - accomplished in engineering, was derived by making the pitch plane and yaw plane superposition
摘要針對傳統比例導引法攻擊機動目標的不足,建立了三維空間中反艦導彈和目標的相對運動模型,在研究反艦導彈攻擊非機動目標的最優制導律基礎上,利用俯仰和偏航兩個平面相疊加的方法,結合滑模控制理論設計了工程上易於實現的三維模型下的反艦導彈最優滑模製導律。分享友人