追蹤器來源 的英文怎麼說

中文拼音 [zhuīzōnglāiyuán]
追蹤器來源 英文
tracker source
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • : 來動詞1 (從別的地方到說話人所在的地方) come; arrive 2 (發生; 來到) crop up; take place; come ...
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • 追蹤 : have in the wind; follow the trail of; track; trace; pursue
  • 來源 : 1. (事物所從來的地方) source; origin 2. (起源; 發生) originate; stem from
  1. Dog starts finding and chasing the ball with light on his eyes and make sound. place the ball in front of dog when it keeps on turning around to look for the ball. play with ducky jr. by remote controller of tv, video, etc

    把電子波啟動后,紅色的訊號燈會亮起,只要將電子波放在小得奇附近,小得奇身上的紅外線探測便會紅外線,並會電子波的位置。
  2. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向演算法的基礎上,著重研究了代數方法編碼反向信息的方案,該方案把重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向問題的一種新的解決方法; ddos陷阱作為反向的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於的ddos防禦方法作為反向有用的補充,將防禦系統部署在網路,通過監控雙向流量檢測攻擊和限制速率終止的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由也得到通知而把這樣的包丟棄。
分享友人