潛行追蹤 的英文怎麼說

中文拼音 [qiánhángzhuīzōng]
潛行追蹤 英文
stalking
  • : Ⅰ動詞1 (隱在水下) go underwater; hide under water; dive 2 (隱藏) hide3 [書面語](涉水) wade ...
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • 追蹤 : have in the wind; follow the trail of; track; trace; pursue
  1. Besides reconsidering the euro - centralism, film studies should put emphasis on the production, circulation, theatrics and reception as well as textuality, intertexuality and sub - texts, etc., rather than the flow of capital

    電影研究除了重新思考歐洲中心主義的問題,還應該超越金錢流動的規則,同時強調電影生產、發、放映和接受的語境、文本、互文性和在文本等方面。
  2. Another way to assess a change s potential value and feasibility is through traceability

    變更的在價值和可性的另一種評估方式是通過可性。
  3. Set in the aftermath of the massacre of 11 israeli athletes at the 1972 munich olympics, the story follows a secret israeli squad assigned to track down and kill the 11 palestinians suspected to have planned the munich attack - and the personal toll this mission of revenge takes on the team and the man who led it

    故事發生在1972年的慕尼黑奧運會上,巴勒斯坦恐怖分子入奧運會選手村,屠殺11名以色列運動員。以色列情報機構mossad隨即進報復動,並向十名屬于黑色九月恐怖組織成員進報復
  4. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向問題,從四個方面對其解決方案進了研究:在分析比較幾種反向演算法的基礎上,著重研究了代數方法編碼反向信息的方案,該方案把重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向問題的一種新的解決方法; ddos陷阱作為反向的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出在ddos攻擊體系結構;基於源的ddos防禦方法作為反向有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
分享友人