system attack 中文意思是什麼

system attack 解釋
系統攻擊
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Continent law department have the value of collateral appeal system and this kind of system, generally in civil lawsuit system lies in mainly to protect the appellee who appeal expect have been full, gives up appeal right or appeal had been rejected, lets him use the appeal program that the appellor has lodged, by the collateral appeal to change or discard the sentence of trial so to realizes both parties equal in attack and defence

    大陸法系民事訴訟制度中,普遍存在著附帶上訴制度,這種制度的價值主要在於保護上訴期已滿、舍棄上訴權或上訴被駁回的被上訴人的利益,讓其利用上訴人的上訴程序,依附帶上訴的方式請求變更或廢棄一審判決,從而實現當事人雙方的攻防平等。
  2. Attack and defend of smart card system

    智能卡系統的攻擊與防護
  3. Multi - target localization is the urgent requirement of exploration system in underwater weapon, which is the basis of anti - counterwork, target recognization, and accurate attack

    多目標定位是水下武器探測系統迫切需要具備的能力,它是反對抗、目標識別、精確打擊的基礎。
  4. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  5. Attack made by using such software is to cause disruption either by deleting files, sending emails, or rendering the host system inoperable

    利用此等軟體來作出的攻擊,會透過刪除檔案、發送電子郵件或使主機系統無法運作來造成破壞。
  6. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  7. It was the world ' s first major chemical attack using sarin, a nerve agent which attacks the respiratory system

    這是世界上首宗使用沙林神經毒氣施襲的重大化學武器事件。
  8. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。
  9. This essay studies higher technology of sanda technology system, when compiling the attack integration technology must according to antagonistic character of sanda sports and some gist and principle

    摘要進攻組合技術作為散打的高級技術,在其編串的時候應該依據散打運動對抗實踐的特點,因此,編串必須遵循一定的依據和原則。
  10. Analysesd the current situation of the implemention of the attack of ecc system, proved that ecc is abundant and safey enough presently, suitable for research and devolopment at present and applicate in normal communication

    同時也給出了目前對ecc系統實施攻擊的現狀分析,證明ecc是充分安全的,適合開展研究及在民用通信中大規模應用。
  11. Idas ( interactive defence and attack system ), the concept has been developed by the german companies hdw ( system integration ) and diehl bgt defence ( missile design ) and the norwegian company kda ( combat system )

    Idas的字面意思是「潛艇互動式防空系統」 ,德國hdw船廠(負責系統總體) 、著名制導武器生產商bgt公司(負責導彈研製) ,以及挪威著名的國防承包商康森博格航宇公司(負責作戰系統研發)等三家公司,正在合作研製。
  12. The topic of the thesis is to research fast response system ( frs ). the research aims to construct the architecture of frs for detecting intrusion, tracing attack source, correlating alerts, evaluating the damage of attack, describing attack, and taking automatic response to attack. three related projects, cooperative intrusion traceback and response architecture ( citra ), automatic intrusion detection environment, and adaptive, agent - based, intrusion response system ( aairs ), are analyzed

    本文旨在對快速反應技術進行研究,建立針對網路攻擊的快速反應系統,該系統具有入侵檢測、攻擊源回溯功能;通過報警信息的關聯、攻擊破壞力的分析,以及攻擊的準確描述,完成對常見網路攻擊的準確定義;並且根據攻擊描述信息,自動對攻擊進行響應,達到有效地阻止攻擊的目的。
  13. This platform system can not only detect and attack in the case of actual combat, but also be used for training the administrator with actual combat experience

    該訓練平臺不僅可以進行在線實戰時的檢測和攻擊,同時也可用於培養有實戰經驗的網路安全管理員。
  14. The dash line indicates the possibility of a direct input to the control system through an angle-of-attack indicator.

    虛線表示,通過攻角指示器,有可能直接輸入到控制系統去。
  15. To take an active position in and anti - air war, we must accurately determine the constitution and the intensity of the enemy air - attack firepower system

    摘要準確判斷敵人空襲火力體系的構成和攻擊強度是防空作戰爭取主動的前提和基礎。
  16. Hackers who attack computer systems are becoming more nimble and are taking less time to exploit system vulnerabilities, a new report says

    一項新的報告說:攻擊電腦系統的黑客變得越來越機敏,他們找到電腦系統漏洞所花的時間越來越少。
  17. Finally, the thesis developed 3d animation flight simulation platform for helicopter using opengl in visual c + +. and the 3d terrain and helicopter model are constructed. the simulation of two typical maneuver ( s maneuver flight and bopup - bopdown ) and terrain following shows that the fight control system of attack helicopter is improved by the realistic optical impact

    本文最後在vc環境下用opengl開發了直升機三維動畫模擬平臺,構造了三維地形和直升機模型,模擬了直升機做蛇形機動、急躍升急躍降、地形跟隨等機動飛行,通過逼真的視覺效果驗證了飛控系統的正確性。
  18. The software designed for the system is validated by experiments and proved correct. the system can s imulate the real air - stream and put it on missile ' s wings to make them work under the same force environment as the real spread process, so the relationship of explosive stuff and attack angle can be calculated

    本文所設計的監控軟體已通過實際系統的驗證,說明整個系統的設計是合理正確的,能夠真實的模擬力矩,產生一種類似真實氣流阻力的載荷,並將其正確施加於彈翼(尾翼)上,使彈翼(尾翼)能在與展開過程中實際受力相同的狀態下工作。
  19. Japan is remembering the lethal nerve gas attack on the tokyo subway system by a religious cult 10 years ago sunday

    這個星期天日本將紀念東京地鐵毒氣襲擊事件10周年。
  20. Nerve gases attack the nervous system of the body by interrupting the breakdown of neurotransmitters that signal muscles to contract

    神經毒氣通過阻斷指示肌肉收縮的神經遞質分解而侵襲人體神經系統。
分享友人