您要查找的是不是:
- Then, a new attack method has been designed, which is able to accomplish the attack when Weak-keys exist in Public Key Cryptosystem based on Discrete Logarithm. 在研究离散对数算法的基础上,作者提出了离散对数公开密钥算法存在着弱密钥的问题,利用作者设计的一套攻击方法,可以破解存在着弱密钥问题的离散对数公开密钥系统。
- As a professional attacking method,network spoofing gives austere challenge to the network administrator. 网络欺骗攻击作为一种非常专业化的攻击手段,给网络安全管理者带来了严峻的考验。
- The definition of IP spoofing is introduced and the attacking method is analyzed in this paper. Besides, the comprehensive defending strategy is provided to protect WEB site. 介绍IP电子欺骗的涵义,并剖析其攻击方法和手段,在分析其所造成的危害基础上,提出保护WEB站点,抵御其"入侵"的综合防御策略。
- The method seems good but it needs to be tried out. 这个方法似乎不错,但需要试验一下。
- As the network attacking method changes constantly, the emerging safety isolation technology, which can exchange data, interdicts the connect in link layer. 在当前网络攻击方式不断变化的背景下,新出现的安全隔离技术直接阻断网络在链路层上的连接,并进行数据交换。
- THE MILITAI"BEE MODEL"ATTACK METHOD IN THE MODERN WAR 析现代战争民兵“蜂虫式”攻击战法
- Inquiry of Attack and Defence to Network's Security Abstract: Discuss some possible attacking methods to internet and presents the steps to defence and withstand. 网络安全中攻防思想探讨摘要:分类讨论了多种可能的进攻方法并提出了对这些进攻方法的常用防范,抵御措施。
- The article is a savage attack on her past action. 那篇文章对她过去的行为进行了恶毒的攻击。
- If the method of attacker can’t be recognized by IDS ,the honeypot technique is more useful to aid IDS to find the more attacking methods. 如果这种攻击方法是IDS不能发现的,那么这种记录和分析就更有意义了。
- One squadron peeled off to attack enemy bombers. 一中队战机脱离编队攻击敌轰炸机群。
- She had an attack of indigestion yesterday. 她昨天消化不良。
- The commander chalked out his plan of attack. 司令官对进攻计划作了粗略的介绍。
- I can't claim infallibility for this method. 我不敢说这方法绝对有效。
- The attack on Pearl Harbor was a crushing calamity. 偷袭珍珠港(对美军来说)是一场毁灭性的灾难。
- The attack would bog down sooner or later. 进攻迟早会陷入停滞状态。
- Summer fallow is the best method of destroying weeds. 夏季休耕是消灭杂草的最好办法。
- An attack of fever carried Gary off. 加里突然患了一种热病,不幸死亡。
- The bacillus can attack us from many ways. 细菌能从许多途径侵入我们。
- Then the classification of DoS attacks methods and frondose fashions are analyzed and detailed analysis on DDoS attacks tools. 然后对DoS攻击方法分类和具体方式进行分析,以及详细的分析DDoS攻击的攻击工具。
- Popularizing this new method is not an easy job. 推广这种新方法不是件容易的工作。