攻擊需求 的英文怎麼說

中文拼音 [gōngqiú]
攻擊需求 英文
need for aggression
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ動詞(需要) need; want; require Ⅱ名詞1. (需用的東西) necessaries; needs 2. (姓氏) a surname
  • : Ⅰ動詞1 (請求; 要求) ask; beg; request; entreat; beseech : 求人幫忙 ask sb a favour; ask a favou...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 需求 : needs; need; demand; requirement
  1. Abstract : suppressing air ? defense operation has become a main type of air attack in order to decrease danger and man damage, pilotless aircraft is just suitable to this requirement

    文摘:壓制防空作戰已成為近期局部戰爭的一個主要空中作戰模式,降低風險、減少人員傷亡是這種戰法的初衷,無人機正適應這種
  2. If you don ' t qualify in the relevant training schools, you can ' t participate in the subsequent battles ? you need your airborne wings to play online in the terrific night - time parachute attack mission, for example

    舉個例子:如果你不符合學校訓練的有關要,你不能參加接下來的戰爭你要得到你的飛行章后才能在線玩令人恐怖的夜晚跳傘任務。
  3. With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security

    隨著網路手段的日益復雜化、多樣化和自動化,傳統的入侵檢測系統( ids )已不能滿足安全
  4. Because of the characteristics of internet such as anonymity and publicity, e - commerce makes it possible for more and more people to be involved deeply in commercial activities in cyberspace. at the same time, it also puts forward a new security requirement : how to fight fraud and prevent exchange activities from the bargainer ' s misbehavior

    由於網際網路絡匿名性及開放性的特點,電子商務的發展一方面使得人們在更廣闊的數字空間內進行商務活動的同時,對信息安全提出了新的:如何防止來自交易實體的欺詐和
  5. Airs classify whether the incident is a continuation of an existing incident or is a new attack, dynamic analysis the incident, cataloging the attack and limit the response based on legal, ethical, institutional or resource constraints. adaptive intrusion response strategies are suggested based on the alarm confidence, attack frequency, assessed risk, and estimated response costs

    系統通過計算報警可信度,限制入侵檢測系統誤報警所產生的負面影響;通過判斷報警信息是新一輪還是原有的繼續,動態分析,調整類別,評估威脅,並根據受保護系統的安全、相關政策、以及響應成功率確定響應機制。
  6. By the way this paper chooses the more effective dm algorithms by deep study in quite a few known algorithms employed in association rules, frequent episodes rules and trend analysis. to speed up producing association rule, this paper also introduces the aadd algorithm which is a upgrade algorithm from apriori

    同時本文通過對關聯規則、模式序列和趨勢分析的多種演算法的深入的分析和比較,結合網路檢測的,為檢測dos選擇合適有效的演算法;並為加快關聯規則挖掘速度,提出apriori演算法的改進演算法? ? aadd演算法。
  7. The war dancer must position himself carefully when attacking to strike a maximum of enemy creatures

    戰舞者要謹慎決定位置,以最大限度地敵人。
  8. With the progress of aviation science & technology and the requirement of air combat, multi - targets attack and coordination for multiple unmanned air vehicles ( uav for short ) become the trend of development. targets assignment and trajectory generation strategy pose significant technical challenges

    隨著航空科技的進步和軍事斗爭的牽引,無人機多機協同多目標將成為未來戰爭的一種重要模式,多架無人機協同多目標中的目標分配和航跡產生是多架無人機協同作戰的關鍵技術。
  9. Therein lies the problem : if you send the code key through the internet prior to setting up encryption, it is sent as plain text - and can be easily intercepted by anyone trying to eavesdrop on transactions

    模糊代碼以產生一個模糊的二進制甚至會有更大幫助。這些技術要潛在的者擁有比在他們要實際破壞您系統時更多的技巧,這通常是一件好事。
  10. Besides, the module to defend illegal attack should also be integrated in stb to ensure secure broadcasting. so it is a key point for the stb developers to develop effective system with high security and independent intellectual property according to national requirements in defending illegal attack

    另外為了滿足電視臺前端安全播出的,研發階段也要將防非功能模塊集成到機頂盒中,根據國家廣電總局制定的防非法基本要,開發高安全性、具有自主知識產權的有效防非監控系統是機頂盒開發商研發的重點。
  11. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
分享友人