1) attack panning
攻击洗淘法
1.
METHODS: A novel attack panning method for selectively culturing γδT cells was set up.
方法 :应用梯度离心法分离大鼠 (n =10 )外周血和BALF中的单个核细胞 ,经贴壁除去单核 /巨噬细胞后 ,用补体攻击αβT细胞 ,再用抗TCRγδ单克隆抗体 (mAb)通过固相法加IL 2刺激选择性培养扩增γδT细胞 (简称“攻击洗淘法”) ;通过细胞生长曲线观察细胞增殖变化 ,采用免疫组化法和流式细胞仪检测鉴定γδT细胞纯度。
2) levigation
[,levi'ɡeiʃən]
粘土淘洗法
3) attack method
攻击方法
1.
In this paper, the classification and their vulnerabilities of wireless sensor network routing protocol are presented, and the attack methods for several network routing protocols are analyzed, and the security strategy of network routing protocol is elaborated.
介绍了无线传感器网络路由协议分类及其脆弱性,分析了几种网络路由协议的攻击方法,阐述了网络路由协议的安全策略。
2.
Various attack methods are fully analyzed and summarized,and some relevant remedies against part of those attacks are put forward,which are of great importance to im.
全面总结和分析了现有的各种数字水印的攻击方法,并对部分攻击方法提出了相应的解决对策,对改进和设计新型的水印算法具有重要指导作用;最后,对数字水印技术未来的研究方向作出了展望。
3.
Three important research directions in computers cryptology are encryption, secret key security and attack method (cryptanalysis).
加密方法、密钥安全性、攻击方法(密码分析学)一直就是计算机密码学研究的三个方面,混沌作为一种新的密码编码源,正引起信息安全领域愈来愈多的关注,本文综述并分析了混沌在保密通讯研究中的这三个重要方面。
4) attacking methods
攻击方法
1.
Current attacking methods to digital image watermarking and basic countermeasures;
常用数字图像水印攻击方法及基本对策
2.
embedding techniques and attacking methods.
该文较为系统地分析了当前关于数字图像水印的常用攻击方法,讨论了数字水印技术未来可能出现的研究热点。
3.
At first,researching the state conversion of system intrusion,analyzing some famous attacking methods,such as TCP SYN FLOODING,IP FRAGMENT OVERLAP and so on,according to defect of the existing intrusion detection technology,a new intrusion detection model is accomplished,intrusion detection technology based on characteristic information sequence parsing is proposed.
对系统入侵的状态转换进行了研究,分析了常见的黑客攻击方法,包括TCPSYNFLOODING、IP分片攻击等。
5) attacking ways
攻击手法
6) Algorithm Attack
算法攻击
补充资料:淘泻
1.见"淘写"。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条