1.
The key technologies in the firewall are attack identification and redirection.
防火墙中关键技术为攻击识别技术和重定向技术。
2.
Research for Anonymous Group Identification Protocol and Identification Scheme Against Reset Attack;
匿名群体及抗重设攻击身份识别方案研究
3.
An Attack Plan Identify System Based on Multi-Alert Fusion;
基于多维告警的攻击目的识别系统研究与实现
4.
But even though you didn't identify the attacker, the intruder still managed to map your network.
但虽然你没有识别攻击者,侵入者仍设法勘测贵网络。
5.
You can use certificates to protect your personally identifiable information on the Internet, and to protect your computer from unsafe software.
可以使用证书保护 Internet 上的个人识别信息,并保护计算机不受危险软件的攻击。
6.
The Proofs of PKE's Chosen Ciphertext Security and That of 2~m-Root Identification Scheme's Security under Concurrent Attacks;
公钥加密方案的选密安全性证明方法及2~m次根识别方案在同步攻击下的安全性证明
7.
She was sharp-witted enough to dodge her attacker.
她才思敏捷足以避开别人的攻击.
8.
Their groundless accusation is made with ulterior motives.
他们的无端攻击是别有用心的。
9.
Let's not engage in personalities.
我们别再进行人身攻击了吧
10.
An Experimental Research on the Relationship Between the Character of Stimulus and the Implicit Aggression of Sexes;
刺激物属性与内隐攻击性的性别差异
11.
giving offense to moral sensibilities and injurious to reputation.
对道德意识发起攻击和对名誉有害的。
12.
To set upon with violent force.
袭击,攻击以暴力攻击
13.
repel an attack [the assailants]
击退进攻[进攻者]
14.
The Differentiation of Lightning Shielding Failure and Back Flashover on High-Voltage Transmission Line;
高压输电线路雷电绕击、反击的识别
15.
Thrust was followed by counter-thrust;
攻击紧跟着反攻击;
16.
Simultaneous Attack
同时攻击,并行攻击
17.
especially their feet, knees and elbows to strike their opponents.
特别是他们的脚、膝和肘来攻击他们的对手。
18.
treated with insolent and rude language especially openly and intentionally.
特别是公开地受到故意的、傲慢粗鲁的语言攻击。