間接攻擊 的英文怎麼說

中文拼音 [jiānjiēgōng]
間接攻擊 英文
indirect aggression
  • : 間Ⅰ名詞1 (中間) between; among 2 (一定的空間或時間里) with a definite time or space 3 (一間...
  • : Ⅰ動詞1 (靠近;接觸) come into contact with; come close to 2 (連接; 使連接) connect; join; put ...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 間接 : indirect; secondhand
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. According to newly unearthed epitaph of li wukui, the paper discusses two issues concerning the historical and geographic study of the western regions : one is that the battle in which li wukui died was the defence of shazhou against the allied attack of the tubo and turk occurred in 694 ; secondly, the date of the establishment of doulujun army of shazhou in the tang dynasty is pushed to the first year of the zaichu reign ( ad 690 ) from the period of shengli reign

    摘要本文根據新出土的李無虧墓誌,重點論述了兩個關于西北史地方面的問題:一是關于李無虧戰死沙場的那次戰爭,為發生在694年同王孝傑克復安西四鎮有著直關系的一場抗吐蕃與突厥聯合進的沙州保衛戰;二是將唐代沙州豆盧軍的設置時由原來聖歷年推至載初元年( 690年) 。
  2. In his days pharaoh neco, the king of egypt, went up against the king of assyria to the river euphrates

    29約西亞年,埃及王法老尼哥上到伯拉河亞述王;約西亞王出去戰。
  3. The definition and model of urgent degree are presented, and the application case is given. this model considers such factors which can influence the urgent degree as the alert times, the elapsed time and so on. in addition, the direct factors and the indirect factors are also considered

    該模型考慮了報警次數、報警已逝去時等因素對危急度的影響,以及影響危急度的直因素和與有關的因素; 3 .危急度在統一報警格式中的應用。
  4. For a short duration, the bladesinger ' s group is protected against ae abilities that do not directly target them. the protection breaks on allies that receive damage

    提供詩人團隊短暫時?圍之防護,除非團隊為?圍之直對象。
  5. We further developed an adaptive packet marking scheme based on one of our router numbering schemes. the maiking scheme is better than others in that there is leys workload, fewer false positives and fewer packets are required in path reconstruction. the last also reduces the time delay before responding to dos attacks

    我們在此基礎上提出了一個基於路由器編碼的自適應包標記方案,該方案無論在路徑追蹤的運算量上、在追蹤的誤報率上,還是在追蹤所需的數據包的數量上(這與在中進行追蹤所需的時緊密相關,從而直影響到對響應的快慢)等多個方面都比同類的方法優越。
  6. Boys exhaled more proactive aggressive behaviors, however, most aggressive events were instrumental whether boys or girls are concerned. 3. no significant changes were found in the overall level of children ' s aggression during age 4 to 5 and children of this age showed stable individual differences in aggression

    但就不同方式的而言,男孩的身體及言語多於女孩,女孩的間接攻擊多於男孩,男孩主動發起的4 5歲兒奮性行為發展及其與家庭因素關系的追蹤研究自)兒童的性水平在45歲之總體上保持穩定,性的個別差異也表現出顯著的穩定性。
  7. For the main body of the intrusion is coming indirect, the scope of it larger, the techniques are distributing and the object is changing, the intrusion detection system must improve its response speed, data analyzing speed and reduce the miss rate and false alarm rate. this system uses both parallel reasoning and fuzzy reasoning techniques

    由於目前入侵趨于主體對象的化、入侵或的規模擴大、入侵或技術的分佈化、對象轉移,因此必須提高入侵檢測系統的實時響應速度、數據處理速度、同時降低系統對漏洞的誤報率和漏報率。
  8. The correlations in attacking connection chains can be constructed by analyzing the increase of the average value of the inter - packet delay between the two connection chains

    通過分析兩個連鏈包延遲平均值的遞增性,確定鏈的關聯。
  9. A method is proposed for detecting stepping stones by actively perturbing inter - packet delay of connections, by which the average value of the packets in the detecting window is set to increase periodically within the attacker ' s perturbation range

    摘要提出一個主動干擾跳板機連中數據包隔延遲的方法,在者所能幹擾跳板機連數據包延遲隔允許范圍之內,使檢測窗口內包延遲的平均值循環遞增。
  10. To change its permissions, an attacker may be able to move or remove the file between those two steps and create a symbolic link to another file say etc passwd

    來修改其權限,那麼者很可能在這兩個步驟之移動或刪除該文件,並創建指向另一個文件(比如/ etc / passwd )的符號鏈
  11. If your server computer is running windows server 2003, you can improve the security of your application by securing the event log and by setting event - log parameters regarding the size, retention, and so on to prevent an indirect denial of service attack against the event log

    如果服務器計算機運行的是windows server 2003 ,則可通過保證事件日誌的安全,以及設置有關事件日誌的大小、保留時等參數,來防止對事件日誌的拒絕服務,從而提高應用程序的安全性。
  12. For example, if a privileged program checks if there s no file of a given name, and then opens for writing that file, an attacker could create a symbolic link file of that name between those two steps to etc passwd or some other sensitive file, for instance

    例如,如果某個已授予特權的程序檢查是否不存在給定名稱的文件,然後打開該文件寫入信息,那麼在那兩個步驟之者可以創建一個使用該名稱的符號鏈文件. .
  13. To exploit this vulnerability seems even easier than session hijacking, as the attacker stays in the middle acting as an ap access point to the real user, and as a user to the actual ap

    利用這一弱點甚至好象比會話劫持更容易,因為者處于實際用戶和實際ap (入點)之,它對于實際用戶冒充ap ,對于實際ap則冒充用戶。
分享友人