助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   攻击 的翻译结果: 查询用时:0.187秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
电信技术
武器工业与军事技术
生物学
心理学
基础医学
航空航天科学与工程
自动化技术
更多类别查询

图标索引 历史查询
 

攻击    
相关语句
  attack
    Research on Countermeasures to Denial of Service Attack and IP Traceback
    拒绝服务攻击对策及网络追踪的研究
短句来源
    Detection and Active Attack Against Hidden Information in Digital Images and Audio Signals
    数字图像和音频中隐藏信息的检测和主动攻击
短句来源
    The Research on Several Pivotal Techniques of Intrusion Detection and DDoS Attack
    入侵检测若干关键技术与DDoS攻击研究
短句来源
    Study on the Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
    抗选择密文攻击公钥密码体制的研究
短句来源
    Research on the Key Technology of Formation and Cooperation Air-to-ground Attack's Intelligent Command and Control System
    编队协同对地攻击智能指挥与控制系统关键技术研究
短句来源
更多       
  attacks
    A Study of Attacks on Ground-targets by Multiple Independently Targetable Warheads
    多弹头导弹攻击地面目标的研究
短句来源
    Correlation Attacks and Correlation Immune Functions
    相关攻击与相关免疫函数
短句来源
    Because of the peculiarity of the MANET,the research for DDoS attacks in MANET is much more different from that in wired network.
    由于移动自组织网络和有线网络存在着结构型差异,因此移动自组织网络中的DDoS攻击研究与有线网络中的DDoS攻击研究有较大的不同。
短句来源
    The detector adopts the ICA,which can not merely extract but detect the watermark without any information about original audio,watermark,embedding process and attacks.
    检测过程中采用独立分量分析技术,在不需要任何原始音频、水印、嵌入的信息以及攻击等信息的情况下,可以检测到水印并可精确提取水印,实现了真正意义上的盲检测。
短句来源
    Based on the requirements of message authentication code (MAC) in current network communication, this paper introduces the cryptographic secure properties of a Hash function, and analyses its applications in message authentication and the main attacks against a Hash function.
    基于当前网络通信中对报文鉴别码(MAC)的需求,介绍了Hash函数在密码学上的安全性质,分析了Hash函数在报文鉴别中的应用和针对Hash函数的主要攻击
短句来源
更多       
  attacking
    Analysis and Estimation of Shooting Probability of Submunition Attacking Large Object
    攻击大目标子母弹射击概率的分析与估算
短句来源
    The Equal Probability Position Diagrams of Submarine Missile Weapon System Attacking Naval Targets
    潜艇导弹武器系统攻击海上目标的等概率阵位图
短句来源
    ALT~+-ALGORITHM FOR ATTACKING CRYPTOSYSTEMS
    密码攻击ALT~+算法
短句来源
    Methodology on Attacking Logic and Decision in Multi targets Attacking
    多目标攻击中的攻击逻辑与决策方法
短句来源
    Then,a method of assessing the operational application effectiveness of cluster bomb attacking single target and collective targets on land is erected.
    针对特定目标及其毁伤类型,给出了评估航空子母弹作战使用效果的指标,建立了一种评估航空子母弹对单个和集群目标攻击效果的方法。
短句来源
更多       
  challenge
    Challenge Test of Suckling Piglets Borne by Pregnant Sows being Immunized with Recombinant Live Vaccine E. coli C600 (pMM085)
    对应用遗传工程活菌苗E.coli C_(600)(pMMO85)免疫母猪所产仔猪的攻击试验
短句来源
    THE CHANGES OF CELLULAR IMMUNE RESPONSEAFTER CHALLENGE WITH vMDV TO THE CHICKS INOCULATED WITH MD VACCINES
    MD疫苗免疫雏鸡vMDV攻击后细胞免疫功能的变化
短句来源
    RECOMBINANT VIRUS EXPRESSING PCR-MODIED HSV-2gD GENE PROTECT MICE AGAINST LETHAL HSV-2 CHALLENGE
    表达HSV-2 gD基因的重组痘苗病毒保护小鼠对抗致死量HSV病霉攻击
短句来源
    Compared with the saline immunized mice (bacteria load was 6.51±0.13), a dramatic reduction of MTB replication was observed in the spleen (bacteria load was 4.51±0.23, P<0.05) of BALB/c mice immunized with DNA vaccine following a subsequent challenge, but the protective efficacy of DNA vaccine was lower than that of BCG vaccine.
    与生理盐水免疫组(细菌负荷6.51±0.13)相比较,DNA疫苗免疫的BALB/c小鼠对攻击感染后MTB在脾脏中增殖有较明显抵抗作用(细菌负荷4.51±0.23,P<0.05),但与BCG免疫组相比脾脏细菌负荷无明显减少.
短句来源
    Homologous challenge demonstrated that immunoprotective rates were 10 - 35%, 80 - 100%and 100% 10, 13, 16 days post vaccination respectively and began to decline 51-65 days post vaccination.
    免疫后10、13和16天对同源RA的攻击表现出10-35%、80-100%和100%免疫保护,51-65天免疫保护力开始下降。
更多       

 

查询“攻击”译词为其他词的双语例句

 

查询“攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  attack
It is showed that this structure is provable resistant against linear attack.
      
Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
      
Wavelet analysis method for detection of DDoS attack on the basis of self-similarity
      
As the traditional methods were not suitable for the detection of small distribute denial of service (DDoS) attack and identification of busy traffic, on the basis of the influence of DDoS attack, one wavelet analysis method was proposed.
      
The experimental results show that the proposed method has more advantages in accurately identifying busy traffic and detection of small DDoS attack.
      
更多          


点击这里查询相关文摘
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关攻击的内容
在知识搜索中查有关攻击的内容
在数字搜索中查有关攻击的内容
在概念知识元中查有关攻击的内容
在学术趋势中查有关攻击的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社