立體攻擊 的英文怎麼說

中文拼音 [gōng]
立體攻擊 英文
multidimensional attack
  • : 動1 (站) stand; remain in an erect position 2 (使豎立; 使物件的上端向上) erect; stand; set up...
  • : 體構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 立體 : 1 (三維的) three dimensional; stereoscopic2 [數學] (幾何體) solid; body立體彩色電視 three dim...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Also, the highly controversial aum shinrikyo sect in japan ( which attacked the tokyo subway with sarin gas ) was trying to build a community of scientists after the model of the foundation and used this book as its inspiration

    在日本受到高度爭議的真理教(在東京的地下鐵使用沙林毒氣)以基地為模型,並且用這本書當作他們的教示,正試著建一個由科學家組成的團
  2. The software vendors argued that public disclosure gave attackers the blueprints to create exploitative programs and viruses

    銷售商認為公開披露為者提供了建可開發程序的設計圖和病毒。
  3. We constructed fences using 2 x 2 x 2 factorial design to examine the effect patterns of food availability, predation and interspecific competition on population dynamics and spatial behavior of reed voles, microtusfortis. we expected to test two hypothesises : ( 1 ) availability of high quality food, predation and interspecific competition have independent and addictive effects on population system dynamics for small mammalia herbivore ; ( 2 ) availabiliry of high quality food could reduce home range and aggressive behavior level between individuals of microtine, predation and interspecific competition have independent effects on spatial behavior of microtine

    以2 2 2析因實驗設計,在野外圍欄條件下,探討食物可利用性、捕食及種間競爭對沼澤田鼠( microtusfortis )種群動態及空間行為的作用,旨在檢驗下述特定假設: ( 1 )高質量的食物可利用性、捕食及種間競爭對植食性小哺乳動物種群系統動態具有獨的和累加的效應; ( 2 )高質量的食物可利用性可降低田鼠個間的行為水平,並導致其巢區減小;捕食與種間競爭對田鼠的空間行為亦有獨的作用。
  4. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨的分散式拒絕服務,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos的全步驟;支持多種模型,特別是構造了反射拒絕服務和脈動模型,強度高且難追溯;有一定繞過防火墻的能力。
  5. If a child is bullied repeatedly, he or she will not only lower gradually his / her self - esteem and self - confidence, become lonely, anxious, depressed, but also show a series of external behavior problems, such as aggressive / destructive behaviors, scatterbrained, lower achievements, social isolation, behavioral withdrawal etc. as to the students frequently bullying others, they will be excluded by peers, and resulting in social interaction difficulties

    經常受欺負不僅會導致兒童孤獨、壓抑、焦慮、自尊和自我評價下降等內部心理問題;而且,還會造成一些外部行為問題,如注意力分散、學習成績下降、經常逃學,行為孤、退縮,具有破壞性或性。對欺負者而言,經常欺負他人會招致同伴群的社會排斥,從而造成社交困難。
  6. The mathematical models are established to describe operational effectiveness of a single and a group aircraft attacking targets during combat sortie

    了在一次出中航空綜合單機在對地階段作戰效能和機群對地作戰效能的數學模型。
  7. Then according to system simulation technology, the overall air - to - ground attack simulation plan is made with the thought of models and layers. after that, the mathematical models of main parts in the simulation are made such as aircraft body, propulsive system, flight control system, fire control system, bomb and air - to - ground missile. on the basis of these mathematical models, using the object - oriented design methodology, a set of air - to - ground attack real - time visual simulation software is developed. this software can be used to aid aircraft design, research of air - to - ground attack tactics and flight training

    本文首先介紹了現代戰爭中空對地的技術裝備及其特點,計算機模擬技術的發展以及面向對象的軟設計思想;而後使用系統模擬技術,依據分層、模塊化設計思想,制定了空對地模擬系統總設計方案;之後根據目前技術狀況,建了戰斗機機、推進系統、飛控系統、火控系統、航空炸彈、空地導彈等子系統數學模型;在此基礎上,利用面向對象的軟設計思想,在基於pc的平臺上開發了一套對地視景模擬軟,實現了戰斗機對地實時視景模擬。
  8. Yet small open economies cannot have an independent monetary policy ( indeed, several have currency boards ) and are vulnerable to external shocks and speculative attacks

    然而,開放的小國經濟不可能擁有一個獨的貨幣政策(的確,一些國家有通貨委員會) ,而且,它們極易受到外部沖和投機性的傷害。
  9. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    在結合橢圓曲線密碼制優點的基礎上,提出一種適于無線通信網路中的相互認證和密鑰建協議,不僅能有效防止上述,還適于在無線終端設備上應用。
  10. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建密碼制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線密碼制的安全性和常見的方法,因為橢圓曲線密碼制的安全性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線非常重要,指出橢圓曲線的計算是復雜的,分析研究了利用有限域f2m上的橢圓曲線建密碼制的相關問題,利用經過仿射代換后的橢圓曲線可以建公鑰密碼制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  11. The truth is that scotland ' s state schools are not achieving anything like the results attained in the private sector

    政府不應該去老是的私教育系,而應該多肯定他們所取得成就,同時應該看看是否能從他們那裡學到一些有用的東西。
  12. In order to break through the limitation of small system model, for the verification of woo and lam u symmetric key protocol with smv, a model is built up. an honest agent in the model is allowed to participate in two protocols. finally a flaw is found that an intruder can successfully commit an attack when the responder is allowed to participate in two protocols simultaneously

    為了突破小系統模型的局限性,我們使用smv驗證wooandlam對稱鑰協議時,建了允許誠實的通信實運行兩次協議的模型,在這個模型上發現了一個已知的協議漏洞,者利用誠實通信實的兩次運行,成功地進行了
  13. In this paper, firstly, three - dimensional geometrical models of the target and ir flares are established and by using the software vega missile attacking process is real - time simulated visually. secondly, the ir radiation characteristic of the target, background and the ir flares are analyzed, in which the wave radiation of the sun at different time, wind speed, the relative humidity and ir radiation attenuation characteristic of the atmosphere is under consideration. from above the ir image of the target, ir flare and the background are got and then are normalized to gray color image that will be showed in a child window in real time

    本文通過三維建模工具creator建目標、背景和干擾的三維模型,再通過視景模擬軟vega生成載機、導彈和目標飛機的可見光場景圖像,實時地對導彈工程進行可視化模擬;並分析了目標、背景和干擾的紅外輻射特性,計算出傳感器路徑上大氣衰減等等,將經過衰減的目標、背景和干擾的輻射強度量化為灰度圖,以子窗口形式實時顯示;進一步可以使目標和干擾按照各自的運動軌跡運動,便可產生動態的紅外熱圖像序列。
  14. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷做出改進,並進行形式化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特性,為彌補防火墻靜態防禦的不足,設計出兩者聯動的方法,探索了高效網路安全系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究結論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了一定的理論基礎。
  15. For fighting more market quotas and customer ' s quota, with paying attention to customer an their honest, these vying enterprises aincline toward more to steal customers of the opponent and attack the quota. when enterprises built up perfect crm system, all of its similar activities will become more valid, and its customer ' s strategy will be more exceptional, including contesting the best customers of its antagonists, protecting best customer and developing the potential customer of its own. the research expresses enterprises which have crm or customer information ability will be placed in an advantage position in the competition

    因為,為了爭奪更多的市場份額和客戶份額,這些競爭型企業在注重客戶保留和客戶忠誠的同時,更傾向于偷挖對手的客戶和對手的份額。當企業建了完善的crm系統時,它的所有類似活動都將變得更加有效,其具的客戶戰略也將變得更有優勢,包括搶奪競爭者的最佳客戶、保護好自己的最佳客戶以及培養自已極具潛力的客戶。
  16. Aspect to association rules mining, constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining. about classification engineering, the mainstream classification techniques were compared through thoroughly experiments, and some improvement was made to decision tree toward the concrete problem, which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount, instead of batch of tcp / ip record, which was very suitable to on - line mining and make naids be high real - time performance

    在關聯規則挖掘上,建了兩種挖掘模式:靜態挖掘模式、動態挖掘模式;實施兩個層面上的挖掘:單層面挖掘、領域層面挖掘;在分類引擎的構建上,通過實驗綜合比較了主流分類技術,並針對具問題對決策樹分類方法進行了應用上的改進,從而使得naids系統具備一定的檢測新類型的能力,而這個特性正是異常檢測的優勢所在;所提出的增量式挖掘方法由於每次只監測一個窗口的數據量,而不是批量處理網路日誌,所以非常適合在線挖掘,從而使得naids在實時性上有較好的性能表現。
  17. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全制就是建在ipsec系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路方法以及常採用的防範對策; 2研究了ipsec標準的總結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼制進行了實現,並為它編寫測試代碼評估其性能。
  18. Meanwhile according to the intrusion tolerance system, we present three methods to detect dns spoofing attack, and then three techniques are given to identify the bogus packets or the right ones. two original attack tracing methods are also proposed

    在容侵系中本文針對dns欺騙提出了三種檢測手段、三種過濾方法,以及兩種新的反向追蹤的方案,為防護平臺的建提供了理論基礎。
  19. In this dissertation, first, the basic conceptions of ew, radar ew and combat effectiveness are made clear about internal characteristics, consist and tasks. then, the evaluation factors architecture of radar ew system combat effectiveness is set up, which is the base of quantificational evaluation. second, mathematics modeling of radar ew reconnaissance, radar jamming and anti radiation attack are constructed

    本論文的研究首先從電子戰、雷達對抗、武器裝備作戰效能的基本概念出發,理清其內涵、特點、組成、任務,從而建以能力為主線的雷達對抗系統作戰效能評估指標系,為定量評估系統作戰效能奠定基礎;然後分雷達偵察、雷達干擾、反輻射分別對雷達對抗系統武器裝備的電子偵察能力、電子干擾能力、電子進能力進行數學建模,進而建系統綜合對抗能力數學模型,為系統模擬建設計基礎。
分享友人