1.
Masquerader Detection and Identification Approach in Sensor Networks
一种传感器网络假冒攻击源的测定方法
2.
Wu?s remote login authentication scheme could not resist the impersonation attack. That scheme is based on simple geometric properties on the Euclidean plane.
Wu提出的基于几何方法的程登录认证方案无法抵制假冒攻击.
3.
incapable of offending or attacking.
没有冒犯或攻击力的。
4.
The army is at the peril of being attacked from all sides.
这支军队正冒着从四方被攻击的危险。
5.
a premeditated attack, murder, insult, etc
有预谋的攻击、 凶杀、 冒犯行为等
6.
They prepared to take their chances on the natives.
他们准备冒被土著人攻击的危险。
7.
any distracting maneuver (as a mock attack).
任何分散注意力的策略(作为假的攻击)。
8.
Formal authentication based on identification of intruder role impersonate
基于攻击者的“角色冒充”的协议验证方法
9.
An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
基于角色冒充对数字签名协议的攻击(英文)
10.
Foreign ships and planes refused to run the risk of attack.
外国船只和飞机拒绝冒遭到攻击的危险。
11.
Research and Realization of Safe Protection Against Phony Attack under the Condition of IPv6
IPv6环境下仿冒攻击的安全防范研究与实现
12.
Defence of False-Signatures-Based Dos Attacks in Wireless Sensor Networks
无线传感器网络中基于假签名DoS攻击的防御
13.
To set upon with violent force.
袭击,攻击以暴力攻击
14.
Companies have made themselves vulnerable to activist hedge funds by playing safe in the past three years.
过去3年来,公司不愿冒险,使自己易受对冲基金活跃分子的攻击。
15.
To assume the identity of, with intent to deceive.
假冒,冒充为了欺骗而假冒身份
16.
repel an attack [the assailants]
击退进攻[进攻者]
17.
Producing and marketing counterfeit and shoddy goods, pyramid schemes and commercial fraud must be severely punished.
严厉打击制售假冒伪劣产品、法传销和商业欺诈行为。
18.
Banning Ill-intended Imitation with Crackdown on Faking,Trademark Pirating and Faulty Goods--A Comparative Analysis in Ethical Perspective;
遏制“行滥”与打击“假冒伪劣”——伦理学视角的一种比较分析