mechanism of the attack of 中文意思是什麼

mechanism of the attack of 解釋
某發病機理
  • mechanism : n 1 (機械)結構;機械裝置[作用];(故事的)結構。2 【哲學】機械論 (opp vitalism)。 3 【文藝】...
  • of : OF =Old French 古法語。
  • the : 〈代表用法〉…那樣的東西,…那種東西。1 〈用單數普通名詞代表它的一類時(所謂代表的單數)〉 (a) 〈...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過性病毒攻擊人體的基本機制是病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。
  2. The basic mechanism of viral attack is that the viruses relicate themselves using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過性病毒能夠引起疾病的機制是,病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。
  3. The basic mechanism of viral attack is that the viruses replicate themselves using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過性病毒能夠引起疾病的機制是,病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。
  4. The basic mechanism of viral attack is that the viruses replicate themselves using the host ' s in this case is " our " dna genetic replication system

    濾過性病毒能夠引起疾病的原因是,病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。
  5. Jasmonates regulate the expression of enormous genes that are involved in response to uv irradiation, wounding, insect attack and pathogen infection. although the ' effect of ja on plant is well - characterized, little is known about the mechanism whereby jasmonates exert their biological functions

    雖然人們對茉莉素的生理功能以及茉莉素的合成途徑已有較多的了解,但是,對茉莉素如何調控植物的多種生理功能的機制卻知之甚少。
  6. To the infiltration of social life of various fields with science and technology, modern dispute and science have been already inseparable, the scientific evidence becomes the new " king of the evidence ", has formed the enormous impact to judge ' s judgement right. this text set forth one ' s views in the platform with the judge how to examine and assert scientific evidence, how to restrain invasion and attack to the mechanism of dispute solves from expansion of expert discourse - right

    關于科學證據的文章可謂汗牛充棟,其中絕大多數是對所謂鑒定體制的批評與設計,對于科學證據的基本問題以及法官如何審查認定科學證據的論文卻寥若星辰。隨著科學技術向社會生活各個方面的滲透,現代糾紛與科學已經密不可分,科學證據成為新的「證據之王」 ,對法官裁判權形成了巨大的沖擊。
  7. According to the geological conditions and the corrosive medium composition of the shaft well , the damaging reason and the mechanism of the concrete attack in the intake shaft well of “ 635 ” project are analyzed , and the corrosion - prevention treating method for the shaft well concrete is presented

    水利樞紐發電引水洞豎井段圍巖中,有黃鐵礦脈風化形成的黃鉀鐵礬化蝕變帶通過.經對豎井襯砌混凝土腐蝕破壞機理的分析后認為,必須採用有效的防腐材料,將混凝土與侵蝕介質隔離開來,對豎井混凝土進行防腐蝕處理
  8. The current policy directions for the second i & c security action plan started in 2005 comprise the following four major goals : " establishment of the national i & c security crisis and incident reporting and alarm mechanism & risk management system ", " consolidation of national i & c security awareness and the promotion of information security educational training ", " standardization and certification services ", and " promotion of international cooperation to attack cyber crimes, " with the hope to " ensure that taiwan has a safe and reliable i & c environment, " through the implementation of i & c security operations

    2005年開始的第二期資通安全機制計劃,目前規劃的政策方向,主要有建立國家資通安全事件通報及危機應變體系、強化國家資通安全認知與推廣資安教育訓練、標?規范與認驗證服務、以及促進國際合作工同打擊網路犯罪等四項,期望藉由資通訊安全作業的落實,確保我國擁有安全、可信賴的資訊通訊環境。
  9. Molecular mechanism and switching of tumor escape from the attack of

    細胞攻擊的分子機制及逆轉作用
  10. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  11. In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed

    為了在分散式網路追蹤系統中協調監控代理,及時共享多點採集的追蹤數據合作定位網路攻擊源,提出一種基於協同機制的攻擊源追蹤方法。
  12. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    本文主要做了以下幾個方面的工作: ( 1 )對一次性口令認證技術進行了深入的分析和探討,針對現存一次性口令認證系統不能抵禦小數攻擊的安全漏洞,提出一種改進的一次性口令認證機制,這種認證機制能夠有效地抵禦小數攻擊和重放攻擊,而且使用時不需要客戶端做任何設置和安裝任何軟體。
  13. After the analysis of the typical instance of the security attack on the unix operating system, it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix

    本文通過重點分析針對unix操作系統的一些攻擊實例,指出現有的unix操作系統自主訪問機制和超級用戶特權實現方式是最主要的安全問題。
  14. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  15. Based on the comparison made among the characteristics of different kinds of the blade materials, the relationship between the material characters and the flow attack angle is explained, and then the breakage mechanism of the combined effects from both the clearance - cavitations and the erosion of leakage flow are expounded comprehensively

    通過對不同材料的特性比較,解釋了材料特性與沖角之間的關系,綜合闡述了泄漏流動所引起葉片正面頭部空蝕與磨損聯合作用產生破壞的機理。
  16. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  17. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  18. A competition mechanism throughout the tunnel etching of aluminum foils is established in this study, namely, the competition between the attack to passive surface by aggressive anions and the passivation caused by passivators ; dissolution competition between side wall of tunnels and overall surface of foils. to demonstrate the competition mechanisms, the etching conditions influencing the morphology of tunnels, surface modification of foils, redemption and regeneration of passive state were investigated

    本文在綜述了目前國內外鋁陽極箔發展和直流電侵蝕理論的基礎上,研究了鋁箔侵蝕過程中影響隧道孔形貌和比容的各種因素,揭示了貫穿于整個侵蝕過程的競爭規律,即蝕孔成核競爭? ?鋁箔表面的活化與鈍化競爭;溶解競爭? ?隧道孔孔壁的溶解與侵蝕箔表面的溶解競爭。
  19. The mechanism of two possible ways of thrust vectoring control : force and moment control are analyzed. the effects of thrust vectoring on aircraft supersonic performance, take - off and landing performance, low speed and high angle of attack performance are studied. the air combat effectiveness of thrust vectoring control and post - stall maneuvers are also analyzed

    5 、分析了推力矢量的兩種應用方式:力控制和力矩控制的機理,研究了推力矢量對飛機超音速性能、起降性能、低速大迎角性能的影響,討論了推力矢量與過失速機動對空戰效能的影響。
  20. Ability in many respects far away from their rival, such as the estimate ability for change, the reaction speed of the market opportunity and the contingency speed of the competition attack etc. customer relationship management, crm, is a management system reflects a new marketing relation - the relation marketing, a new management mechanism to improve relationship between business enterprises and customers, also a set of new management software and technique. along with the propulsion of the globalization and fly technically to develop soon, competion turns to be worse further, it is also imposible for business enterprise to acquire competitive advantage continuously from

    研究表明,具有crm或客戶信息能力的企業在競爭中會處處占據上風,他們在許多方面的能力遠遠超過了競爭對手,諸如對布場變化的預測能力、對市場機遇的反應速度、對競爭性攻擊的應變速度等都會更勝一籌。客戶關系管理是反映新型營銷關系? ?關系營銷的管理系統,是一種旨在改善與優化企業與客戶之間關系的新型管理機制,也是一套新的管理軟體和技術。
分享友人