rate of attack 中文意思是什麼

rate of attack 解釋
侵蝕速率
  • rate : n 1 比率,率;速度,進度;程度;(鐘的快慢)差率。2 價格;行市,行情;估價,評價;費,費用,運費...
  • of : OF =Old French 古法語。
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Years ago, dna typing achieved such wide acceptance and proven reliability that opponents now concentrate on two principal points of attack : ( 1 ) the quality and methodology of the laboratory work, including the lab ' s error rate, and ( 2 ) the statistical interpretation of data

    幾年前, dna鑒定贏得了廣泛的接受並證實了它的可靠性,現在,反對者開始集中於兩點進行攻擊: ( 1 )實驗室工作的質量和方法論,包括實驗室的誤差率; ( 2 )數據的統計學解釋。
  2. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  3. Thunder clap slams the ground, dealing damage to and slowing the movement speed and attack rate of nearby enemy land units

    魂守開始太脆,吸+分效率成問題。猛獁靠波去練如何?和熊貓道理彷彿。
  4. C thunder clap slams the ground, dealing damage to and slowing the movement speed and attack rate of nearby enemy land units

    魂守開始太脆,吸+分效率成問題。猛獁靠波去練如何?和熊貓道理彷彿。
  5. It is for the reason of lacking coordination of exchange rate arrangement in east asia that the east asia financial crisis broke out in 1997 under the attack of international flowing capital

    東亞地區正是由於缺乏匯率政策的協調與合作,在國際游資的沖擊下,最終爆發了1997年東南亞金融危機。
  6. The hand of a mighty demon warlord which was mutilated by az to punish his loss. adds + 24 damage and 10 % attack rate and grants the hero the ability of disease cloud

    曾經是位強大惡魔督軍的手掌,后來被阿茲截下以懲罰他的失敗。增加24點傷害與10 %攻速,並付予持用者疾病雲的能力。
  7. They had an amazingly low heart attack and heart disease rate, despite eating a diet laden with fat, including 500gms of fatty fish and whale meat each day

    他們驚訝愛斯基摩人為什麼會有較低的心臟病發生率,盡管他們也是脂肪超量的飲食,每日500克的過肥的魚肉和鯨魚肉。
  8. The last ten years of 20th century, disturbance and crisis emerged one after another in international field ; present international monetary system is facing great challenge. heart of the contradiction is shown as the attack of international capital flow to a country ' s monetary and exchange rate regime

    二十世紀的最後二十年,國際金融領域風波迭起,危機頻仍,現行的國際貨幣體系面臨著前所未有的挑戰;而矛盾的核心突出表現在國際資本流動特別是國際投機資本對一國貨幣、匯率制度的沖擊問題。
  9. A kind of weird weapon used by evil assassins. adds + 18 damage and 30 % attack rate

    一種被邪惡刺客所使用的怪異武器。增加18點傷害與30 %攻速。
  10. Further research will address questions such as whether, during a highly stressful event such as the last minutes of a close football final, people at risk would benefit from added medicine to prevent blood clots, fast heart rate and raised blood pressure that could increase the risk of a heart attack

    進一步的研究將立足於這樣一個問題:在一場激烈的橄欖球比賽終場前的最後幾分鐘里,處于興奮中的人們能通過增加服藥量來避免血栓,心率加快和血壓升高等增加心梗可能的癥狀發生。
  11. In addition, the paper studies the drawbacks of the existing network invasion detecting system and concludes that the basic reason why the users are not satisfied with them is that it is hard to reduce both the misinformation rate and the rate of failing to report simultaneously. then, it presents that attack defending system and invasion analyzing system are the two key orientations for the development of invasion detecting system, and also analyzes and explores their corresponding technological requirements

    文中對當前網路入侵檢測系統的不足進行了深入的分析,認為誤報率和漏報率難以同時降低是導致用戶對其不滿的根本原因,指出:攻擊防護系統和入侵分析系統將是入侵檢測系統發展的兩個主要方向,並對相應的技術要求進行了分析和探討。
  12. The author makes some analysis on the possibilities of the financial crisis under the two types of. regimes for the developing countries. we find that the concentration and accumulation of the exchange rate risks are huge under the fixed pegged exchange rate arrangement, so it is easy to induce the attack of the enormous hot money

    通過發展中國家兩種匯率制度下發生金融危機的可能性進行了分析,結果發現:與浮動匯率制度相比,固定釘住匯率制度下的外匯風險集中度高、風險累積程度深、外匯投機沖擊發生可能性大,易引發資本項目下的金融沖擊,造成貨幣危機。
  13. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  14. A general model of subliminal channels and some necessary conditions that the carrier cryptosystem must holds are given. a secret channel and an attack channel are first defined and some basic conclusions of the security are given. two new parameters, the embedding rate and the channel - using rate, that have large effects on the capacity and the security of subliminal channels are first defined

    給出了閾下通道系統的一般模型和宿主密碼系統須滿足的必要條件,首次定義了閾下通道中的秘密通道與攻擊通道,並給出關于安全性的基本結論,首次定義了對容量和安全性有一定影響的嵌入成功率和通道使用率兩個新參數。
  15. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  16. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是未標定的不均衡數據集的情況,把攻擊檢測問題視為一個孤立點發現或樣本密度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡數據集對于數目較少的那類樣本分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  17. Analysis and evaluates the characteristics of typical attack scenarios from the aspects of the possibility, ability of concealment, release rate and harmfulness of the possible attacks

    從襲擊發生的可能性、隱蔽性、生化制劑的釋放速度和危害性這四個方面,對典型生化襲擊場景的特性進行了分析和評價。
  18. A record rate of 4. 3 million page hits in a day was served during a typhoon attack. such figures are rarely seen in the world

    在臺風襲港期間,該網站更創下在一天內應付430萬頁次的紀錄,這些數字都是世界少見的。
  19. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  20. Notwithstanding the three rounds of speculative attack on the hong kong dollar in early january, mid - june and early august, the exchange rate of the hong kong dollar against the us dollar remained stable throughout, moving within a narrow range of 7. 736 to 7. 75

    港元先後在一月初、六月中及八月初受到三輪投機沖擊,但其間港元兌美元匯率一直維持穩定,只在7 . 736至7 . 75之間窄幅徘徊。
分享友人