潛行追蹤 的英文怎麼說
中文拼音 [qiánhángzhuīzōng]
潛行追蹤
英文
stalking- 潛 : Ⅰ動詞1 (隱在水下) go underwater; hide under water; dive 2 (隱藏) hide3 [書面語](涉水) wade ...
- 行 : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
- 追 : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
- 蹤 : 名詞(腳印; 蹤跡) footprint; track; trace; trail
- 追蹤 : have in the wind; follow the trail of; track; trace; pursue
-
Besides reconsidering the euro - centralism, film studies should put emphasis on the production, circulation, theatrics and reception as well as textuality, intertexuality and sub - texts, etc., rather than the flow of capital
電影研究除了重新思考歐洲中心主義的問題,還應該超越追蹤金錢流動的規則,同時強調電影生產、發行、放映和接受的語境、文本、互文性和潛在文本等方面。Another way to assess a change s potential value and feasibility is through traceability
變更的潛在價值和可行性的另一種評估方式是通過可追蹤性。Set in the aftermath of the massacre of 11 israeli athletes at the 1972 munich olympics, the story follows a secret israeli squad assigned to track down and kill the 11 palestinians suspected to have planned the munich attack - and the personal toll this mission of revenge takes on the team and the man who led it
故事發生在1972年的慕尼黑奧運會上,巴勒斯坦恐怖分子潛入奧運會選手村,屠殺11名以色列運動員。以色列情報機構mossad隨即進行報復行動,追蹤並向十名屬于黑色九月恐怖組織成員進行報復It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。分享友人