正面攻擊 的英文怎麼說

中文拼音 [zhēngmiàngōng]
正面攻擊 英文
frontal attack
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 正面 : 1 (人體前部那一面; 建築物臨街的一面; 前進的方向) front; frontage; facade 2 (主要使用的一面) t...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. There is a difference in personality between the violent offender and the nonviolent crime, and between the schizophrene and normal person with aggressive behavior also

    在精神常人群中,暴力罪犯和非罪犯有人格方的差異,精神分裂癥患者和精神常者的行為也有不同的人格基礎。
  2. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份等方的問題。
  3. Fixed a bug where rogues were able to use the ability " ghostly strike " when not facing their target

    了當盜賊沒有對目標而仍然可以使用鬼魅的錯誤。
  4. Since my basic strategy is to throw every available unit right at my enemies, i ' ve found i have to start holding some forces back in case my enemy manages to find a way to hit me in an unguarded location

    所以盡管我的基本策略還是將每個卒子投入到與敵斗爭中,我還是得在後方留點預備隊以防一旦被敵人後方的未設防區域。
  5. Attackers can deliberately craft their input so that it escapes out of quoting, and chain an arbitrary query on the end of the one you had intended to run

    者可以蓄意地安排他們的輸入,使之溢出引號之外,並在您想運行的真查詢後鏈接上任意一個查詢。
  6. We anticipated that the enemy would attack us frontally

    我們預測敵人會從正面攻擊而採取應變措施。
  7. But there have also been ads like the one in florida [ accusing ] a republican congressman of [ profiting ] from [ so - called ] [ drug ] deal

    但是也有一些正面攻擊的廣告,佛羅里達州的某則廣告指責一位共和黨國會議員從所謂的藥品交易中牟利。
  8. A non - invasive interface to track eye position using digital image processing techniques is under development

    用數碼圖像處理技術來跟蹤眼睛位置的沒有性的界在研發中。
  9. Then toward the siege of jerusalem you shall set your face with your arm bared, and you shall prophesy against it

    7你要對著被圍困的耶路撒冷,露出膀臂,說豫言這城。
  10. Captain is facing a major threat from a rival don yunus ( vishwajeet pradhan ), and after an attack on his life he decides to teach the city a lesson

    「上尉」對的主要威脅來自競爭對手貴族雲納斯(威什瓦吉特?普拉丹) ,在對他的性命進行一次后,他決定給這座城市上一堂課。
  11. But even after you take the plunge and remortgage the dog, you are liable to find that you have entered an education system which is increasingly under attack from all sides

    甚至等你為了學費把你的寵物都抵押的時候,你會發現,你已經選擇的教育體系原來是在受到來自各個方不斷
  12. The two fanatic nationalists who tried to assassinate truman in 1950 attacked him when he was living across the street in blair house while white house was being renovated

    兩名狂熱的民族主義分子與1950年試圖刺殺杜魯門總統。他們杜魯門時,白宮在翻修,杜魯門柱在對的布萊爾旅館。
  13. Unarmed assailant - - frontal attack

    徒手
  14. Unarmed assailant - frontal attack

    徒手
  15. The plan was based on the fact that the line of the french operations was too extended, and on the suggestion that, instead of or along with a frontal attack, barring the advance of the french, attacks should be made on their communications

    這個方案的論點是:法軍的戰線拉得太長,我軍不必從堵截法軍,應當他們的交通線,或則一作戰,一他們的交通線。
  16. Aspect to association rules mining, constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining. about classification engineering, the mainstream classification techniques were compared through thoroughly experiments, and some improvement was made to decision tree toward the concrete problem, which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount, instead of batch of tcp / ip record, which was very suitable to on - line mining and make naids be high real - time performance

    在關聯規則挖掘上,建立了兩種挖掘模式:靜態挖掘模式、動態挖掘模式;實施兩個層上的挖掘:單層挖掘、領域層挖掘;在分類引擎的構建上,通過實驗綜合比較了主流分類技術,並針對具體問題對決策樹分類方法進行了應用上的改進,從而使得naids系統具備一定的檢測新類型的能力,而這個特性是異常檢測的優勢所在;所提出的增量式挖掘方法由於每次只監測一個窗口的數據量,而不是批量處理網路日誌,所以非常適合在線挖掘,從而使得naids在實時性上有較好的性能表現。
  17. A florida judge says lisa nowak can remove the monitoring bracelet from her ankle. the former astronaut stands accused of attacking a romantic rival at the orlando airport

    (佛羅里達州的律師(錯誤)說麗薩可以拆掉她腳踝上的監視器環,這位前宇航員臨指控,這關繫到她(本可以直截了當,繞了彎子還讓人困惑)在奧多蘭機場她的情敵。 )
  18. Instead get in the attack position above the saddle stand bend at the waist pull back with the arms don ' t pull straight up or you will pull the front wheel off the ground

    確的方式是采姿勢,屁股離開座墊,彎腰,手臂往後拉,但不可拉得太直,否則會把前輪拉離地
  19. Through analyzing the results, we expatiate the feasibility of using dsp to implement digital signature. in hardware design, tms320c50 chip is chosen as the core processor and electrical periphery circuit is designed on basis of it. the function and connection information of digital signature electric circle is presented in detail in this report. at last, the validation software of signature is accomplished in computer. we run the whole system to get the result of digital signature and its validation, thus verify the correctness of the signature and the validity in identifying attack

    本次設計在硬體上採用的核心處理晶元為tms320c50 ,在熟悉此晶元的內部結構的基礎上,設計了處理器晶元的外圍功能模塊輔助電路,製作了簽名電路板和硬體介板,本文具體給出了數字簽名電路板和介電路板各部分電路塊的功能和接線情況。最後,在計算機中編寫了簽名驗證軟體,並給出運行整個系統得到的對數據「簽名」和對「簽名驗證」的結果,對數字簽名結果的確性和識別的有效性進行了驗證。
  20. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方的措施建議,最後,給出了保證中間業務常運行的安全服務方案。
分享友人