您要查找的是不是:
- network attack trace back 攻击源追踪
- Finally, future develops in network attack tracing technologies are discussed including quantitative evaluation metrics, theoretical models, multicast systems, mobility abilities, ipv. 网络攻击源追踪技术在实时阻断或隔离攻击、追究相关责任、提供法律举证、威慑攻击者等方面具有非常积极的意义。
- Her fear of water can be trace back to a childhood accident. 她很怕水,起因可归于儿时的一次事故。
- The steps are easy to trace back. 易于将这些步骤倒退回去。
- Means to trace back to or to date from. 用在这裡是指探索事物的由来。
- Along with network attack increasing,the important network section will trace the network aggressor and protect its own right by the law. 随着网络攻击事件的不断增加,重要的网络部门需要追踪到网络攻击者,并运用法律武器保护自己的权益。
- Then, according to the requirements of FRS, new techniques such as attack source trace back, alerts analysis and automatic response to attack are addressed and implemented. 其次,根据快速反应系统的需求,对攻击源回溯技术、报警分析技术、攻击自动响应技术等进行了研究,并设计了一个实用的快速反应系统原型。
- His fear of snake trace back to an experience in his childhood. 他对蛇的惧怕溯自他孩童时的一次经历。
- Her fear of water can be traced back to a childhood accident. 她很怕水,起因可归於儿时的一次事故。
- His fear of snakes traces back to an experience in his childhood. 他对蛇的惧怕溯自他孩童时的一次经历。
- It is trace back to far past that tradition friendship between our country. 我们两国人民之间的传统友谊,可以追溯到遥远的过去。
- Cyber war methods include computer network attack, transmitting computer viruses and other destructive hacking. 网战战法包括;攻击电脑网络系统;发送电脑病毒以及其它破坏性黑客行为.
- The tradition friendship between our two people can trace back to far elapse. 我们两国人民之间的传统友谊,可以追溯到遥远的过去。
- Due to continuous network attack, HKHA forum will be closed for maintenance. Sorry for any inconvenience caused. 因不断受到网络攻击,讨论区将暂时关闭以作维修,不便之处,敬请见谅。
- The earlist currency in China can trace back to thousands of yeas ago. 中国最早的货币可以追溯到几千年前。
- In the network attack that launched in the light of Estonia 2007, among them a means namely psywar. 在2007年针对爱沙尼亚发起的网络攻击中,其中一个方式即心理战。
- His family traces back to the Norman Conquest. 他的家世可追溯到诺曼人征服英国的时代。
- Cyber war methods include computer network attack, tra mitting computer viruses and other destructive hacking. 网战战法包括;攻击电脑网络系统;发送电脑病毒以及其它破坏性黑客行为.
- The assiciation between our two countries can be traced back to last century. 我们两国之间的往来可以追溯到上个世纪。