说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> LO-KO攻击
1)  LO-KO attack
LO-KO攻击
2)  Aggression [英][ə'ɡreʃn]  [美][ə'grɛʃən]
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
3)  Attack [英][ə'tæk]  [美][ə'tæk]
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
4)  attacking [英][ə'tæk]  [美][ə'tæk]
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
5)  attacks [英][ə'tæk]  [美][ə'tæk]
攻击
1.
Attacks and Counterattacks of Digital Watermarking;
数字水印技术的攻击与反攻击研究
2.
Attacks on Robustness of Digital Watermarking and the Responding Remedies;
数字水印稳健性攻击及相应策略
3.
Discussion on ARP Loopholes and Defense ARP Attacks
ARP漏洞及其ARP攻击防范
6)  assault [英][ə'sɔ:lt]  [美][ə'sɔlt]
攻击
1.
Research of Framework Model and Assault Methods of Image Digital Watermark System;
图像数字水印系统的框架模型及攻击方法研究
2.
Moreover,a seckrity policy and a security mode for preventing assault from inside of intranet are obtained through the analysis of the framework principle.
文章描述了IPSec协议和IPSec的结构 ,通过对于此结构上的理论分析 ,获得了一种对于防止来自企业网络内部攻击的安全策略和安全模式 ,并提出了基于此模式下的对于本地网络安全的实施和管理方
补充资料:(1-butanamine)[[2,2'-(thio-kS)bis[4-(1,1,3,3-tetramethylbutyl)phenolato-kO]](2-)]-Nickel
CAS: 14516-71-3
分子式:C32H51NNiO2S
中文名称: (1-丁胺)[[2,2-(硫-KS)二[4-(1,1,3,3,-四甲基丁基)苯酚根合-KO]](2-)]镍

英文名称: (1-butanamine)[[2,2'-(thio-kS)bis[4-(1,1,3,3-tetramethylbutyl)phenolato-kO]](2-)]-Nickel
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条