1)  attack tolerant
攻击可容
2)  Aggression
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
3)  Attack
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
4)  attacking
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
5)  attacks
攻击
1.
Attacks and Counterattacks of Digital Watermarking;
数字水印技术的攻击与反攻击研究
2.
Attacks on Robustness of Digital Watermarking and the Responding Remedies;
数字水印稳健性攻击及相应策略
3.
In this paper,we first analyze the principle of DoS/DDoS attacks,and then we update the classification of DDoS/DRDoS attacks,including 3 categories such as TCP/IP protocol vulnerabilities attacks,software vulnerabilities attacks and brute-force attacks.
DDoS攻击(包括DRDoS攻击)给网络安全带来了巨大的危害。
6)  Interpretation Attack(IBM Attack)
解释攻击(IBM攻击)
参考词条
补充资料:等容热容
分子式:
CAS号:

性质:系统在体积不能改变的条件下温度升高1K所需的热,符号Cv。此时系统所吸取的热完全用来增加其内能。因为等容过程中系统吸热Qv=△U,所以Cv就是系统升高1K时其内能的变化。用数学式表示,为 Cv=其中代表偏微分,下脚V表示体积不变。关于Cv与Cp关系参见等压热容。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。