攻防模式 的英文怎麼說

中文拼音 [gōngfángshì]
攻防模式 英文
annex
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 攻防 : winhacking
  • 模式 : model; mode; pattern; type; schema
  1. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨立的分散拒絕服務擊軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos擊的全步驟;支持多種型,特別是構造了反射拒絕服務擊和脈動型,擊強度高且難追溯;有一定繞過火墻的能力。
  2. She also receives a + 2 competence bonus on saving throws against psionic attack modes, which stacks with any bonus granted by raising a psionic defense mode, if any

    他同時在對抗心靈的豁免上有+ 2能力加值,這個加值可以和心靈帶來的加值累計。
  3. In this situation, the tracking stability, guidance accuracy, attacking distance and anti - jamming ability of single - mode guidance is not satisfied for modern war. so multi - mode compound guidance and data fusion technology appear

    因此,在空作戰中若仍採用單一制導的導引頭,其在跟蹤穩定性、制導精度、擊距離以及抗干擾性能上很難滿足現代戰爭的要求。
  4. Stone - escaping skill ; sideboard corner stone capture ; stalemate triple alive ; the common skill of weiqi ; hane and two - step hane ; dig between two enemy stones ; abandon strategy ; fantasy capturing stone - by abandoning ; expand territory ; way of connection ; a set sequence of moves joseki ; attack defense skill ; common opening stage theory ; position situation judgment

    逃子技巧邊角吃子要領雙活與三活圍棋常用手法連拔及反打挖的運用棄子戰術巧妙吃子倒脫靴擴張枰通連方法常用定介紹手筋常見布局探討形勢判斷要領
  5. Abstract : suppressing air ? defense operation has become a main type of air attack in order to decrease danger and man damage, pilotless aircraft is just suitable to this requirement

    文摘:壓制空作戰已成為近期局部戰爭的一個主要空中擊作戰,降低風險、減少人員傷亡是這種戰法的初衷,無人機正適應這種需求。
  6. According to objective orientation, the authors offered the following suggestions : in terms of routine setup, we should base the main contents on the essential combos of representative martial arts carefully selected, and base the initial posture, ending posture and transitional posture on the exclusive chinese fist clenching courtesy ; in terms of routine training, we should seek for the power of expression, and concurrently take care of move standardization as well as offense and defense awareness ; in terms of teaching, we should adopt the mode of learning single move techniques and combo move techniques first, then doing an antagonistic exercise, and finally putting series moves into a complete routine

    根據目標定位,建議在套路編排方面,以精選的代表性拳種的精華組合為主要內容,以中國獨有的抱拳禮為起收勢和銜接點;在套路訓練方面,以求取勁力為立足點,併兼顧動作的規范和意識;在教學方面,採用先進行單勢技法、組合技法學習,再進行對抗性練習,最後進行套路串接的
  7. 3 using game theory and the three different criterions, the author investigates optimal allocation of tactical missiles between a primary target and a secondary target under the condition that the primary target is defended by the secondary target ( the defender can use either " normal " defensive mode or " cautious " defensive mode ), presents the optimal attacking policy of the attacker and the optimal defensive policy of the defender

    3利用對策理論和三個不同的準則,研究了一個主要目標在一個次要目標衛下(次要目標採用「理智」) ,戰術導彈對這兩個目標打擊的優化分配問題,給出了進方的最優進策略和守方的最優守策略。
  8. For instance, if ialdabode were targeted with psionic attack modes by three illithids, he could attempt to raise psionic defense modes against all three attacks during the same round

    例如,假如艾達波迪被三隻靈吸怪同時用心靈擊,他可以在同一輪內嘗試對所有三次擊各啟用一次心靈
  9. The defender raises a defense mode without knowledge of the specific attack mode

    禦者在不知道的情況下啟用
  10. There are five psionic attack modes and five psionic defense modes ( see below )

    有五種心靈和五種心靈(見下文) 。
  11. The next key control around mobile, z, x, c bonds for three attack mode, the space bar defense

    上下左右鍵控制移動, z x c鍵為三種,空格鍵禦。
  12. An eati - based analyzing method of system modeling entity oriented was proposed creatively, then a common process of realizing distributing simulation system modeling was expounded by using uml, and at the end, the specific modeling ballistic missile defence simulation system was researched

    摘要提出了一種基於eati面向實體的系統建分析方法,闡述了利用uml工具實現分散擬系統建的一般過程,然後針對彈道導彈對抗擬系統這一具體的應用,進行了建研究。
  13. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )火墻實現研究》的主要內容有: ( 1 )通過transproxy擬實驗及ipv6 / tunnelbroker型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷擊做出改進,並進行形化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全型: ( 3 )基於ids系統的動態特性,為彌補火墻靜態禦的不足,設計出兩者聯動的方法,探索了高效網路安全體系研究的新方向; ( 4 ) hef火墻實現的理論研究及擬實驗,所得三部分研究結論均可設計出module ,內嵌入火墻系統中,為國內火墻產品的設計提供了一定的理論基礎。
  14. Regardless of initiative order, a defender may always attempt to put up a defense mode as a free action if he or she has sufficient power points to pay for it and is not flatfooted

    不管先權順序如何,禦者只要有足夠的靈能點且並非措手不及,就可以嘗試啟用心靈
  15. Then the advantages and the disadvantages of current intrusion detection system were studied. in numerous intrusion methods, the attack from the bounce host is more difficult to defend. this paper aims at this kind of attack method, proposes a framework model of a distributed - ids based on soft agents and builds a prototype on this model

    在眾多入侵方中,通過跳板主機發起的入侵擊是一種較難範的擊方法,本文針對這種擊方,利用agent的移動性和自主性優勢,提出了一個基於軟體agent的分散入侵檢測系統構架,並針對該構架進行了建與原型實踐。
  16. Special considerations : if the defender raises a psionic defense mode but still fails the will save, the mental hardness granted by the mode, if any, still reduces the total ability damage dealt by the attack ( except in the special case of id insinuation )

    特殊事項:若禦者啟用了心靈但意志豁免仍失敗,該提供的精神硬度(如果有的話)仍可減免該擊造成的屬性傷害總值(除了「本我暗示」的特殊情況) 。
  17. Suppose a psionic character has power points and has not been caught flat - footed - - - can he elect not to use a psionic defense against an attack and simply make an unadjusted will save against the attack

    假設靈能人物還有靈能點,也沒有措手不及,他能選擇不用心靈對抗擊而只是簡單地進行無調整的意志豁免么?
  18. Psionic attack and defense modes are supernatural, not spell - like. using an attack mode draws an attack of opportunity, but using a defense mode does not

    心靈擊和是超自然能力而不是類法術能力。使用引發借機擊,但使用不會。
  19. It can use psionic attack modes ( and psionic undead relish attacking the living in this fashion ), but also must learn defense modes, since undead take ability damage from psionic attacks modes

    它可以使用心靈(而且靈能亡靈生物喜歡用這種手段擊活物) ,但仍需要學習心靈,因為亡靈生物也會因心靈而受到屬性傷害。
  20. Psionic attack and defense modes are summarized on table 4 - 2 : psionic attack modes and table 4 - 3 : psionic defense modes. each mode is described in expanded format at the end of this chapter

    心靈擊和在表4 - 2 「心靈」和表4 - 3 「心靈」中有總結。每種的詳細介紹在本章最後。
分享友人