1.
Research of Wireless LAN Malicious Access Points Searching Method
无线局域网恶意接入点搜索方法研究
2.
marked by or arising from malice.
以恶意为特点或者起于恶意。
3.
having the nature of or resulting from malice.
具有恶意的特点或者因为恶意而导致。
4.
characterized by enmity or ill will.
以敌意或者憎恶为特点。
5.
Having evil thoughts, opinions, or intentions.
恶毒的,狠毒的有恶意的想法、观点和意图的
6.
an indirect (and usually malicious) implication.
间接(而且通常是恶意)的牵连。
7.
Crackers do the same thing but for malicious purposes.
非法侵入者行为相同,但出于恶意。
8.
Discussion on the Law Criminalizing of "Malicious Back Pay"
“恶意欠薪”行为入罪之合理性探讨
9.
A reputation-based model for malicious node detection in WSNs
WSNs基于信誉机制的恶意节点识别模型
10.
Let's go directly to the point.
让我们直接进入要点。
11.
The conversation plunged straight into some burning questions.
谈话直接进入热点问题。
12.
The technique to detect malicious beacon signals is the basis of detecting malicious beacon nodes.
发现怀恶意的指标讯号技术是发现怀恶意的指标节点基础.
13.
Round toward negative infinity means round the result of a floating-point operation to the representable value nearest to and no greater than the result.
四舍五入到负无限意思是调整浮点运算的结果成最接近结果并且不大于结果的最接近值.
14.
snap to attention.
快速地进入注意的焦点
15.
Investigations on TDD RF Receiver System of B3G Access Point;
B3G接入点TDD射频接收系统的研究
16.
Research on the Technique of Countering Malicious Nodes in Wireless Sensor Networks
无线传感器网络恶意节点防范技术研究
17.
A Multipath Secure Routing Protocol Based on Malicious Node Detection
基于恶意节点检测的多路径安全路由协议
18.
Design and analysis of private-preserving dot product protocol under malicious model
恶意模型下保密点积协议的设计与分析