1.
Analysis and Defense of Enhanced Attack Tree-Based Complex Attacks
基于增强攻击树的复杂攻击分析与防御
2.
Frangibility of Complex Networks Based on Flow Attack and Edge Failure
基于流量攻击和边失效的复杂网络脆弱特性
3.
Computational Complexity Analysis on Improved Py Distinguish Attack Algorithm
改进Py区分攻击算法的计算复杂性分析
4.
Choosing Method of Aim Points for Cluster Wavhead Shooting Complex Multi-area Target
子母弹攻击复杂多区域面目标瞄准点选取方法
5.
The concrete step and complexity of the attack algorithm is given.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
6.
attack the enemy camp in reprisal [as a reprisal]
攻击敌人阵营作为报复
7.
Forecast Algorithm for Multi-Step Attack Based on Attack Utility
基于攻击效用的复合攻击预测方法研究
8.
a satirical magazine tilting at public figures
攻击社会名流的讽刺性杂志.
9.
An Attack for Hash Function HAVAL-160 with 4 Passes;
对4圈杂凑函数HAVAL-160的一个攻击
10.
Preimage Attack on 104-step Hash Function HAVAL
对104步杂凑函数HAVAL的原根攻击
11.
To set upon with violent force.
袭击,攻击以暴力攻击
12.
The Instauration of Attacked IE Browser and the Prevention Methods
浅淡IE浏览器受攻击的恢复和预防
13.
Combos Use a Shield Bash/Block, then attack with Revenge.
组合技使用盾击/盾牌格挡,然后再使用复仇攻击。
14.
repel an attack [the assailants]
击退进攻[进攻者]
15.
Thrust was followed by counter-thrust;
攻击紧跟着反攻击;
16.
Simultaneous Attack
同时攻击,并行攻击
17.
Sun Tzu s Insight into War Complexity in Terms of the Tactic of Attacking with Fire;
从火攻谋略看孙子对战争复杂性的认识
18.
The Destruct Probability of Complicated Plate-shell Structure under Impulsive Load;
冲击载荷对复杂板壳结构的破坏概率