displaced aggression

精品项目网 2024-05-18 10:15:19

基本释义:

移置攻击移置攻击

网络释义

1)displaced aggression,移置攻击移置攻击

2)removal attack,移除攻击

3)Mobile attack,移动攻击

4)reset attack,重置攻击

5)network attack location,攻击位置

6)attack state graph,攻击状态转移图

用法和例句

Hidden information removal attack based on wavelet HMT model;

基于小波域HMT模型的隐写信息的移除攻击

The new ID-based identification scheme can withstand the reset attacks and impersonation attacks,and avoid the key escrow problem of many ID-based schemes by using secret key generation technique of the certificateless public key cryptosystem.

基于双线性加群G1上计算Diffie-Hellman问题的困难性假设下,采用无证书公钥密码体制密钥生成原理,首次提出了一个能有效抵抗重置攻击和冒充攻击的基于ID的身份鉴别方案,避免了基于身份的诸多方案所涉及敏感的密钥托管问题。

An identification scheme based on ID cryptosystem is analyzed and shown to suffer from reset attacks and impersonation attacks.

分析并证明了一个基于ID的身份认证方案易受重置攻击,从而导致方案在冒充攻击下是不安全的。

Using the secret key generation technique of the certificateless public key cryptosystem,a new identity(ID)-based identification scheme that can withstand reset attacks and impersonation attacks was proposed.

针对网络环境下用户身份的鉴别问题,依据双线性加群上计算性Diffie-Hellman问题的困难性假设建立了一个随机语言模型,采用了无证书公钥密码体制私钥生成方法,首次提出了一个能有效抵抗重置攻击和冒充攻击的基于身份(ID)的身份鉴别方案。

Second,it builds the attack state graph(ASG) of the computer network to describe the process of vulnerability exploitation.

针对大规模计算机网络的脆弱性评估,提出了一种基于贝叶斯网络近似推理的评估方法,对网络各组件和影响网络安全的因素进行建模,采用模型检测工具生成攻击状态转移图,描述网络脆弱性的利用过程,通过采用随机采样的方法对网络的攻击状态转移图进行近似推理,经过对采样样本的统计分析得到网络脆弱性评估的量化结果,为提升网络的安全性能提供理论依据。

ATTACK REMOVAL OF STEGANOGRAPHY IMAGES IN HMT MODEL BASED BLOCK-DCT DOMAIN

基于HMT模型的block-DCT域隐写图像移除攻击

Dead zone has been removed. Hunters range is now 5-35 (41 with talents) yards.

猎人的攻击盲区被移除。远程攻击范围为5~35码(有天赋的话是41码)。

19 people were killed in the attack in addition to the attacker.

在此攻击事件中除了攻击者外另有十九人丧生。

Creates a thick armor shell around Leviathan that protects him against attacks. Additionally, this ability sometimes randomly removes negative buffs.

潮汐猎人生出厚实的盔甲,帮助他抵御攻击。此外,这层盔甲也会随机移除负面的魔法效果。

The shield must be deactivated if any attack is to be attempted.

若我们发起攻击,必定解除此防护罩

The Treant deals melee damage while in unrooted form.

可移动形态时,该树人可进行近战攻击。

Gretchen had switched targets and he no longer was under attack.

格丽卿转移了目标,也不再受攻击了。

Research of Flooding Attack and Prevention in Ad hoc Network;

移动Ad hoc网络洪泛攻击与防范的研究

Research on Network Anti-Attack Techniques Aimed at Mobile Codes;

针对移动代码的网络反攻击技术研究

Protection of Mobile Agent from Malicious Hosts;

保护移动Agent免受恶意主机的攻击

Research on black hole attack in mobile Ad hoc networks

移动Ad hoc网络的黑洞攻击研究

Differential Power Attack on Liner Feedback Shift Register

线性反馈移位寄存器的差分能量攻击

The Effect of Routing Attacks on Mobile Ad Hoc Network

路由攻击对移动Ad Hoc网络的影响分析

Spoofing Attack in Route Optimization of Mobile IPv6

移动IPv6路由优化中的欺骗攻击

Modeling and Simulation of DoS Attacks in Mobile Ad Hoc Network

移动Ad Hoc网络中DoS攻击的建模与仿真

A Melee Sword Attack That Briefly Renders The Bladesinger Immune To AE Attacks Unless They Are The Direct Target Of That Effect.

近战剑技攻击,使诗人免疫範围攻击,除非诗人是範围攻击的直接对象。

The Spirit of Redemption cannot move, attack, be attacked or targeted by any spells or effects.

救赎之魂不能移动,攻击,被攻击或者被任何法术或者效果选中。

Empathy and Aggressive Behavior of Middle School Students:The Mediating Effect of the Anger-Hostility Action;

中学生移情与攻击行为:攻击情绪与认知的中介作用

下一篇:没有了
上一篇:hereditary connection
精彩图文
相关推荐
  1. abelian theorem

    精品项目网为您提供阿贝耳定理abelian theorem是什么意思,abelian theorem翻译,abelian theorem例句,abelian theorem用法等有关,abelian theorem单词知识大全供您查询使用!...

    0 条评论 59 2024-05-16 17:56

  2. Multistep methods

    精品项目网为您提供多步方法Multistep methods是什么意思,Multistep methods翻译,Multistep methods例句,Multistep methods用法等有关,Multistep methods单词知识大全供您查询使用!...

    0 条评论 59 2024-05-16 19:06

返回顶部小火箭