attack data 中文意思是什麼

attack data 解釋
攻擊諸元
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. Years ago, dna typing achieved such wide acceptance and proven reliability that opponents now concentrate on two principal points of attack : ( 1 ) the quality and methodology of the laboratory work, including the lab ' s error rate, and ( 2 ) the statistical interpretation of data

    幾年前, dna鑒定贏得了廣泛的接受並證實了它的可靠性,現在,反對者開始集中於兩點進行攻擊: ( 1 )實驗室工作的質量和方法論,包括實驗室的誤差率; ( 2 )數據的統計學解釋。
  2. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  3. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    本文首先從數據來源、數據處理周期、數據收集和分析、入侵檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,分析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵數據分析的智能性、面臨新的入侵方法時的適應性和網路配置發生變化時的可擴展性等方面的不足和問題。
  4. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  5. The data above can be used to predict relative reactivities and points of attack.

    可用上述數據預言相對活性和反應發生的位置。
  6. According to the statistical data, there are more than 1 / 3 terrorism attack inci - dents which are aimed at u. s. a. facing the phenomenon, we have to pay at - tention to and keep a look out it. the thesis will initially probe into the prob - lem

    據統計資料顯示,在全球每年發生的國際恐怖主義襲擊事件中,平均有三分之一以上都是針對美國的,這一現象不能不引起我們深刻的思考,本文擬對這一問題進行初步探討。
  7. There ' s no need to attack anyone ' s data

    沒有必要誣蔑彼此的研究成果
  8. In theory, disaster tolerance technology includes heartbeat detection technology and many other technical means, such as two module backup, computer cluster, storage area network, etc. in computer systems, when human operation failure occurs, system error occurs, or even physical attack, lack of power, flood and other disaster occur, disaster tolerance technology can prevent system from losing data, meanwhile, provide high availability service

    從范疇上講,容災技術包括心跳檢測技術在內的許多技術手段,如雙機熱備份,計算機集群,存儲區域網路等。在計算機系統發生人為失誤,系統錯誤,甚至受到外來打擊或者遭到停電,洪水等災難性的破壞時,容災技術仍能使系統在少損失數據甚至不損失數據的情況下對外提供高可用不間斷或間斷時間很短的服務。
  9. Attackers can use this fact to " slip through " data validators to attack programs

    攻擊者可以利用這一點來「騙過」數據驗證來攻擊程序。
  10. Rc6 is a simple and flexible cipher, which is based on rc5. we apply square attack to rc6. operations of rc6 is from different algebraic groups and it uses many data - rotations

    Rc6是一種既簡單又復雜的密碼演算法,是在rc5的基礎上設計出的,它使用了大量的數據依賴循環。
  11. Experimental data from the towing tank tests show that the hydrofoils give more water - drags on the raft ' s hull, and that the hydrodynamic performance of a ferrying raft will be improved by rational designs of the hydrofoils ' profile, angles of attack as well as the position of hydrofoil on the hull

    船模水池中的模型拖曳試驗表明,盡管水翼會增加門橋的水阻力,但只要合理地設計水翼的翼型、攻角和安裝位置,可以改善和提高門橋水動力性能。
  12. Fourthly, we discuss and simulate the transformation method of relative parameters of ground target based on data link. and then we analyze decision algorithm of air - to - ground attack. especially, we educe three dimensional terminal guidance law of air - to - ground missile in the disturbance of wind, and give the simulation result

    本文也研究了空對地攻擊的若干技術,包括對獲得數據鏈指揮下地面目標相對于某攻擊機當前時刻相關參數的方法進行了闡述及模擬,並在此基礎上討論了單機對地面多個目標的攻擊決策演算法,同時提出了一種風干擾下空地導彈的三維末制導導引律,且利用數字模擬進行了驗證,並指出研究空地導彈導引律時考慮風影響的必要性。
  13. Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users

    它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種防禦措施來削弱和消除攻擊流量對網路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。
  14. But this presents some risk, because a malicious user could insert inappropriate data, or attempt a script injection attack, using the ability to edit string - typed properties. as a security practice, if you create custom

    不過,這一功能帶來了一定的風險,因為惡意用戶可以藉助此功能編輯字元串類型的屬性,從而插入不恰當的數據或者試圖發起腳本注入式攻擊。
  15. For this trial, the dsmb was conducting a monthly analysis of mortality data and a quarterly analysis of a number of outcomes including stroke, heart attack, and reascularizations ( e. g., coronary stents or bypass surgery ) to ensure the ongoing safety of patients in this trial

    此次試驗中,數據安全監控委員會( dsmb )每月分析死亡數據,每個季度分析終點數據包括:中風、心臟病發作和血管再通術(冠脈支架或者旁路手術)來確保試驗病人的安全。
  16. 3. the project using ins / gps system data to estimate the angle of attack and sideslip is brought forward first. this project using the ins / gps system data, such as acceleration and velocity signal, and others signals of the aircraft, such as gyros and the mathematic models, to estimate virtual signal

    首次採用ins gps系統數據來估計迎角和側滑角傳感器參數原理和方法,利用ins gps系統測量的地速和總加速度信號結合飛機其他傳感器和數學模型估計得到了迎角和側滑角傳感器的虛擬信號,該種方法具有很好的實時性。
  17. The mobile agent might steal resources, confidential data or use the remote host as starting point for a new attack

    例如竊取主機的資源、機密數據或利用此遠程主機發起新的攻擊。
  18. In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed

    為了在分散式網路追蹤系統中協調監控代理,及時共享多點採集的追蹤數據合作定位網路攻擊源,提出一種基於協同機制的攻擊源追蹤方法。
  19. Just as the role of infantry is to " close with and destroy the enemy, " the last half of the definition explains that iw is used to attack or defend, directly or indirectly, as a means to dominate, degrade or destroy, or protect or preserve data, knowledge, beliefs or combat power potential

    第四,正像步兵的任務是「接近並消滅敵人」一樣,定義的後半部分說明信息戰「以對信息系統的直接或間接進攻和防禦為手段,達成對數據、知識、信念或戰斗潛力的控制、削弱、破壞、保護或貯存。 」
  20. In order to protect applications from this kind of attack or ambiguity, application designers or developers should add the identity of the intended recipient to application data to be signed

    為了讓應用能避免此類攻擊或模糊點,應用的設計者或開發者們應該在待簽名的應用數據中加入目標接收方的身份。
分享友人