1.
Research of guards against the invasion of the ASP wooden horse in hypothesized main engine;
防范ASP木马入侵虚拟主机的研究
2.
Hackers often use Trojan-horse programs to break into computer systems.
骇客们常用木马程序来入侵计算机系统。
3.
Research of Intrusion Detection Based on Data Mining and Trojan Technique;
基于数据挖掘的入侵检测方法与木马技术研究
4.
TROJAN HORSE DEFENSE IN NEW ZEALAND AND CHINA;
中国和新西兰刑法关于电脑犯罪规定的比较研究——从入侵法律内部的木马病毒谈起
5.
The Study of the Cell Structure in the Secondary Xylem in Three Invasive Plant Varities
3种入侵杂草次生木质部的细胞结构
6.
They secured the city against the Romans.
他们守卫该城,抵御罗马人入侵。
7.
During the first century the Romans invaded Britain.
在一世纪罗马人入侵了不列颠。
8.
The Goths invaded Rome in A.D. 410.
哥特人于公元前410年入侵罗马。
9.
The Romans invaded England in 55 B.C.
公元前55年罗马人入侵了英格兰。
10.
Research on Intrusion Detection Based on Markov Chain
基于马尔柯夫链的入侵检测方法研究
11.
Markov Chain Model of Syscall based Intrusion Detection
基于系统调用入侵检测的马氏链模型
12.
Intrusion scenarios building based on hidden Markov models
基于隐马尔可夫模型的入侵场景构建
13.
King of the Huns(433? -453) and the most successful of the barbarian invaders of the Roman Empire.
阿提拉匈奴帝国国王(433?-453年),最成功入侵罗马帝国的野蛮入侵者
14.
Many of the desert scrub species that have invaded these ranges are fire intolerant.
许多由沙漠侵入这些牧场的灌木种都是耐火的。
15.
Fire seems to have been the critical factor in preventing invasion of the grassland by woody plants.
火似乎是阻止木本植物侵入草地的关键因素。
16.
INTRUSION OF EXOTIC PLANTS OF LATE PERMIAN INTO THE NORTHERN MARGIN OF TARIM
塔里木北缘晚二叠世外区植物入侵事件
17.
Marshal montgomery command the grind force In the Invasion of normandy
蒙哥马利元帅在诺曼第入侵中指挥地面部队
18.
one of the Teutonic people who invaded the Roman Empire in the 3rd to 5th centuries.
3—5世纪入侵罗马帝国的日尔曼语民族的人。