active attack 中文意思是什麼

active attack 解釋
主動攻擊
  • active : adj 1 活動的,有活動力的;【生物學】活性的;【電學】有功的;【無線電】有源的;【物理學】放射性的...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. China implements a military strategy of active defense. strategically, china pursues a principle featuring defensive operations, self - defense and attack only after being attacked

    中國實行積極防禦軍事戰略,在戰略上堅持防禦、自衛和后發制人的原則。
  2. Abstract : this paper deals with the earth environmental protection related to the destruction of the ozonosphere by freon from people ' s daily life, and human ' s active measures to meet this attack

    文摘:綜述了與百姓生活密切相關的氟里昂對臭氧層的破壞所帶來的全球性的環境保護問題以及人類對這一問題的積極應戰。
  3. The shm ( single hole microblowing ) as a new perturbation active control technique has been applied to the slender body with different model noses at zero sideslip and high angle of attack

    摘要在亞臨界流動范圍內,對具有不同頭部形狀的尖拱形細長旋成體在無側滑大迎角下進行單孔位微吹氣擾動控制實驗。
  4. To take an active position in and anti - air war, we must accurately determine the constitution and the intensity of the enemy air - attack firepower system

    摘要準確判斷敵人空襲火力體系的構成和攻擊強度是防空作戰爭取主動的前提和基礎。
  5. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。
  6. Strategy attack means strategy behavior of active attack in the competition by enterprise

    戰略進攻是指企業在競爭中主動採取攻勢的戰略行為。
  7. With the trend of emphasis on concealable attack and forcible ruin to military supporting systems, passive locating methods can be seen as an important direction to the development of locating methods and perfection to existing locating systems. passive locating methods have the merits of far distance, concealable receiving and low probability to be detected, compared to active locating methods. so, passive locating system can help to improve viability and battle effectiveness of the whole system in the electronic war environment

    在越來越強調軍事支援系統隱蔽攻擊和硬殺傷的趨勢下,採用被動方式工作的無源定位方法作為定位方法發展的一個重要方向和對現有定位系統的完善,較有源定位方法具有作用距離遠、隱蔽接收、不易被對方發覺的優點,對于提高系統在電子戰環境下的生存能力和作戰能力具有重要作用,同時在航海、航空、宇航、偵察、測控、救援和地球物理學研究中有著廣闊的應用前景。
  8. Based on active network, this system making use of active network concepts and technology to automated respond to ddos attack in entire network level

    它建立在主動網的基礎之上,利用主動網的觀念和技術實現跨網路安全管理域的響應。
  9. A new study shows that women can significantly cut their risk of having a heart attack by eating right, drinking a moderate amount of alcohol, staying physically active, maintaining a healthy weight and not smoking

    一份新的研究表明,女性可以通過適當飲食,飲酒,做運動,維持健康的體重和少抽煙減少心臟病發病幾率
  10. Mozi ' s main social political theory consists of the view of valuing able and virtuous men, the view of valuing identity, the view of negating attack, the view of universal love, the view of valuing justice, the religion - like conception of man and nature, the frugal conception of consumption and active conception of education

    客觀、準確地把握墨子的社會政治思想是本文的立足點,充分認識這些思想的現代價值是本文的根本目的。墨子的主要社會政治思想包括:尚賢論、尚同論、非攻論、兼愛論、貴義論、半宗教性質的消費觀及積極教育觀。
  11. Research rocket tank - this upgrade changes steam tanks into war engines, giving them a rocket - like attack versus air units. currently not active

    研究火箭坦克-這個升級項目可以把攻城坦克變為"戰爭機器" ,給它們火箭用以攻擊空中單位
  12. Level 2 - gives a 20 % chance each attack to go into a rampage, increasing your attack speed by 150 % and move speed by 30 % for 10 seconds. cannot re - trigger itself while active

    二級-在攻擊中有20 %的幾率暴走,提升150 %的攻擊速度和30 %的移動速度。持續10秒,期間不能再次發動。
  13. Level 1 - gives a 10 % chance each attack to go into a rampage, increasing your attack speed by 150 % and move speed by 30 % for 10 seconds. cannot re - trigger itself while active

    一級-在攻擊中有10 %的幾率暴走,提升150 %的攻擊速度和30 %的移動速度。持續10秒,期間不能再次發動。
  14. Level 3 - gives a 30 % chance each attack to go into a rampage, increasing your attack speed by 150 % and move speed by 30 % for 10 seconds. cannot re - trigger itself while active

    三級-在攻擊中有30 %的幾率暴走,提升150 %的攻擊速度和30 %的移動速度。持續10秒,期間不能再次發動。
  15. The spirit is unable to be damaged or attack, but grants the effects of spirit bond while active

    寵物的靈魂無法被攻擊或受到傷害,但激活時仍將保有靈魂連接效果。
  16. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square攻擊應用於rc6密碼,發現square攻擊只能攻擊少數幾輪rc6 ,這主要是因為rc6的數據依賴循環運算打亂了活動位元組和固定位元組的傳播路徑,使得攻擊無法進行。我們分析了對serpent密碼的square攻擊, serpent密碼的按比特線性混合運算打亂了所構造multiset的傳播路徑,使得攻擊只能進行到3輪serpent密碼。
  17. Ids ( intrusion detection system ) is an active preventing method of network security. it obtains information actively from internal system and kinds of network resources. according the information, it can know the possible intrusion and attack, then informs in time the administrator what has happened, thus offer protect for network system

    Ids是一種主動的網路安全防護措施,它從系統內部和各種網路資源中主動採集信息,尋找違反安全策略的行為或攻擊跡象,從中分析可能的網路入侵或攻擊,並及時通知管理員是否有入侵發生,為網路系統提供保護。
  18. The unauthorized alteration of certain system files is one of the symptoms of an active attack, or compromise upon a system

    對系統特定文件的未授權改變是對系統進行攻擊和危害活動的表現之一。
  19. A malware incident response plan is not one that should focus on an active attack ; instead, it needs to concentrate on the payload left behind on your systems

    一個惡意軟體事故響應計劃並非關注某個主動攻擊,而是要致力於系統留下有效負載。
  20. With the various and in - depth attack mode, the technology of anonymous communication has developed for more than 20 years. it has comed into being many anonymous ideas, technologies and practical systems based on chaum ’ s mix idea. but all of them can not defend all the attacks, especially the classical active attack ? ? the n - 1 attack. this kind of attack is the principal threat of anonymous systems based on the mix idea

    匿名通信技術在針對其攻擊方法的不斷多樣化和深入化中走過了20多年的發展,在chaum的mix思想基礎上產生了許多匿名思想和技術並有許多實際的系統在應用,但是都不能完全抵禦所有攻擊方法,尤其是經典的主動攻擊? ? n - 1攻擊,這種攻擊方法是基於chaum的mix思想的匿名系統的首要威脅。
分享友人