進攻性使用 的英文怎麼說

中文拼音 [jìngōngxìngshǐyòng]
進攻性使用 英文
offensive use
  • : 進構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 使 : Ⅰ動詞1 (派遣; 支使) send; tell sb to do sth : 使人去打聽消息 send sb to make inquiries2 (用; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 進攻性 : offensive
  • 進攻 : attack; assault; offensive
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整、識別擊行為、對異常行為行統計和審計、自動地收集和系統相關的補丁、使誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  2. By adopting the combination of quality and quantity analysis, the thesis first analyse how to determine the enemy fighter plane during an air - attack to our secured target by four cases, then analyse the intensity of the enemy air - attack firepower by practicable air force, daily fighter intensity, and daily fighter quantity

    與定量相結合的方法,對如何判斷敵空襲被掩護目標使的兵器種類行了分析,然後從空襲可兵力、日出動強度和日出動量三個方面對空襲火力體系的擊強度行了深入研究。
  3. Aim will be to utilize your forces variety to appropriately counter enemy attacks. use predators and zone troopers to deal with enemy armor and to somewhat soak up hits

    目標是利你的部隊多樣恰當的的抗敵人的使捕食者和區域防禦兵來對付敵人的裝甲部隊,同時吸收擊。
  4. However, the military application of uwb pulsers is limited by the fact that they have to depend on the ground dc power supply as their primary energy source

    目前,各種超寬帶脈沖發生器都離不開地面的直流充電系統,因而使得它在軍事領域的應受到限制,尤其是制約它作為武器的使
  5. While aflame, the character ' s charisma modifier ( not score ) increases by + 2, she can make melee touch attacks as with the hand afire ability, and she gains damage reduction 10 / + 1

    燃燒時人物的魅力調整值(不是屬值)會+ 2 ,他可以如使「火焰之手」能力般行近戰接觸擊,並且獲得傷害減免10 / + 1 。
  6. 2. 1 whose presence within the venue in the authorities opinion may be a source of danger, nuisance, or annoyance or may otherwise give rise to concerns in relation to the safety and security arrangements for the event. this includes excessive noise, the use of foul, obscene, abusive or racist language, the wearing or other display of political or offensive signage or logos, the throwing of any object that might injure or cause damage to people or property or engaging in any conduct, acting towards or speaking to any person in a manner which offends, insults, humiliates, intimidates, threatens, disparages or vilifies that other person on the basis of that other persons race, religion, colour, descent or national or ethnic origin

    2 . 1有關部門判斷該持票人入賽區可能會成為危險危害或麻煩的來源或者會對賽事的安保安排造成負面影響,包括過大的噪音,使污穢的猥褻的辱罵的或種族歧視的語言,身體穿著佩戴或其他方式展示具有政治色彩或冒犯的標志或標識,投擲任何可能傷害他人人身或破壞財產的物品或行任何針對他人的種族宗教膚色祖籍或國籍和民族擊侮辱羞辱威脅恫嚇辱罵或貶損的行為或言語
  7. Upgrade hr - v, your robot companion, with armor, weapons and special equipment. command hr - v to perform offensive and defensive tactical combat maneuvers, or combine your efforts and unleash special attack combos

    玩家要對你自己的游戲搭檔? ? hr - v :一名身穿盔甲、攜帶武器和特殊裝備的機器人行各種屬的升級。命令hr - v使帶有和防禦的戰鬥技巧,或者憑借你自身的努力來給予強有力的特殊擊。
  8. In the latter case, an offensive pricing strategy based on scale economy and experience curve has resulted in a secure leading position in the microwave oven market with an absolute control of the market

    其利規模經濟、經驗曲線而行的定價策略,使其牢牢地把握著中國的微波爐市場,成為該市場的絕對領導者。
  9. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    本文主要做了以下幾個方面的工作: ( 1 )對一次口令認證技術行了深入的分析和探討,針對現存一次口令認證系統不能抵禦小數擊的安全漏洞,提出一種改的一次口令認證機制,這種認證機制能夠有效地抵禦小數擊和重放擊,而且使時不需要客戶端做任何設置和安裝任何軟體。
  10. Having watched his side dominate the second half, but appear to run out of ideas in the final third, jurgen klinsmann reversed the change he made to his starting line - up by bringing off tim borowski and putting on the more attack - minded bastian schweinsteiger

    第73分鐘:看到自己的球隊控制了下半場,克林斯曼開始使換人名額,他把安排在首發陣容里的博洛夫斯基換下,派上原來的主力、更具的施魏因施泰格。
  11. Having to draw and deploy the defensive weapon under direct physical attack leaves everyone with a more realistic perspective on how to carry it, how to practice with it and what can go wrong when you use it

    抽獎和部署防禦武器行直接的身體擊葉片大家一個更為現實的角度,就如何貫徹,如何在實踐中有什麼可以出錯,當您使
  12. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square擊應於rc6密碼,發現square擊只能擊少數幾輪rc6 ,這主要是因為rc6的數據依賴循環運算打亂了活動位元組和固定位元組的傳播路徑,使擊無法行。我們分析了對serpent密碼的square擊, serpent密碼的按比特線混合運算打亂了所構造multiset的傳播路徑,使擊只能行到3輪serpent密碼。
  13. In order to break through the limitation of small system model, for the verification of woo and lam u symmetric key protocol with smv, a model is built up. an honest agent in the model is allowed to participate in two protocols. finally a flaw is found that an intruder can successfully commit an attack when the responder is allowed to participate in two protocols simultaneously

    為了突破小系統模型的局限,我們使smv驗證wooandlam對稱鑰協議時,建立了允許誠實的通信實體運行兩次協議的模型,在這個模型上發現了一個已知的協議漏洞,擊者利誠實通信實體的兩次運行,成功地行了擊。
  14. Instant : you can play a card with the “ instant ” keyword any time ? even during your opponent ' s turn. many abilities and a few allies have this keyword

    瞬發:你能夠在任何時候使瞬發卡片,即使是在對手的回合裏面。很多能力卡和小量軍隊卡有這樣的屬。 (注:如果有瞬發的部隊卡,意味著可以在對手的回合中直接? )
  15. Meanwhile, if the new technology can reduce the cost sharply, the social welfare when two firms adopt the new technology may be lower than that when only one firm adopts it. this means that stronger incentive regulation and asymmetric regulation induce “ too many innovation ”. on the other hand, if the innovation is expensive and risky, and imitation is easy, the stronger incentive regulation and asymmetric regulation may increase the imitation profits of inefficient firm, so that it would adopt the waiting - imitation strategy, and this would reduce the aggressive innovation profit of efficient firm and prevent either firm from innovating

    此時,若新技術能夠大幅降低生產成本,則兩個廠商都採新技術時的社會福利可能會低於單個廠商採新技術時的社會福利,即強激勵規制政策和不對稱規制政策會引發「技術創新過度」 ;反之,當創新成本很高,且風險較大,模仿又比較容易時,強激勵規制政策和不對稱規制政策可能會增加低效率廠商的模仿收益,從而使其嚴格採取等待-模仿策略,這會減少高效率廠商的創新收益,從而削弱它的創新動力,並最終阻礙自然壟斷產業的技術步,此時,強激勵規制政策和不對稱規制政策導致了「技術創新不足」 。
  16. The technological characteristic of the disc brake, taking response characteristic and fine control characteristic as its main indexes, is the core of its service behaviour

    一步加強工藝特研究與關,同步開展配套控制技術的研究與開發,重視使與維修人員的崗前培訓等。
  17. Aspect to association rules mining, constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining. about classification engineering, the mainstream classification techniques were compared through thoroughly experiments, and some improvement was made to decision tree toward the concrete problem, which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount, instead of batch of tcp / ip record, which was very suitable to on - line mining and make naids be high real - time performance

    在關聯規則挖掘上,建立了兩種挖掘模式:靜態挖掘模式、動態挖掘模式;實施兩個層面上的挖掘:單層面挖掘、領域層面挖掘;在分類引擎的構建上,通過實驗綜合比較了主流分類技術,並針對具體問題對決策樹分類方法行了應上的改,從而使得naids系統具備一定的檢測新類型擊的能力,而這個特正是異常檢測的優勢所在;所提出的增量式挖掘方法由於每次只監測一個窗口的數據量,而不是批量處理網路日誌,所以非常適合在線挖掘,從而使得naids在實時上有較好的能表現。
  18. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路擊方法以及常採的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應場合以及其工作機制; 3研究了當前常的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特和具體的使方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利vc + + 6 . 0作為開發平臺對一類混沌密碼體制行了實現,並為它編寫測試代碼評估其能。
  19. China s extensive and well - established ballistic missile industrial infrastructure continues to concentrate on replacing liquid - propellant missiles with mobile solidpropellant ones, reflecting concerns for survivability, maintenance, and reliability and developing high - priority lacms for theater and strategic missions

    中國龐大而全面的彈道導彈工業基礎設施繼續側重以移動固體推導彈取代液體推導彈,並重視導彈的持久、維護及可靠,同時作為重點項目積極研製於戰區和戰略使命的陸巡航導彈(
  20. We do researches on constructing normal model of network traffic, analysizing self - similarity of network traffics - hurst parameter, and its time variable function h ( t ). experimental analysis confirmed the validity of the novel mechanism, limiting the extent of network traffic in time and detecting the ddos attack through measuring the change of h parameter brought by the attacks. moreover we use database to refine the ddos attack

    主要成果為: ( 1 )對網路流量的自相似? hurst參數、 hurst參數的時變函數h ( t )行分析,建立正常網路流量模型,比傳統的特徵匹配更準確描述了網路流量的特; ( 2 )通過實驗驗證了,基於正常網路流量模型,對網路流量行實時限幅,由自相似的變化來預測ddos擊方法的正確; ( 3 )對于不同的擊方式,我們使不同的方法行檢測,並數據庫對流經的包頭信息行統計分析,來對擊定位。
分享友人