These attacks included shootings at schools and hospitals, shelling, airstrikes, improvised explosive devices, looting of medical supplies and the use of facilities by the military.
在他看来这些攻击的核心,他的个人权威和不能被支持。
In his mind these attack the very core of his personal authority and cannot be countenanced.
这些攻击和恐吓行为完全无法令人接受,直接违反了联合国安全理事会第2046(2012)号决议的规定。
These attacks and acts of intimidation are completely unacceptable and are in direct contravention of the provisions of United Nations Security Council resolution 2046(2012).
这些攻击的目标通常是获取安全信息,无论是个人财务记录,行为数据还是内部通信。
The goal of these attacks is often to gain access to secure information, whether that may be personal financial records, behavioral data, or internal communications.
这些攻击通常是为了停止一个互联网连接的主机,然而一些尝试可能的目标一定机以及服务。
These attacks are usually intended to cease the services of an internet connected host however some attempts may target a certain machine as well.
这些辱骂你听,这些攻击,你会面对,他们必须面对,而且需要勇气。
These slurs that you hear, and these attacks you will face, they must be confronted- and it will take courage.
我们的结果表明,神经系统可以检测到这些攻击并通过重塑或加强这种保护结构来做出反应。
Our results show that the nervous system can detect these attacks and respond by remodeling or strengthening this protective structure.".
会话Cookie篡改-这些攻击尝试利用cookie来绕过安全机制或向应用程序服务器发送错误数据。
Session Cookie Tampering- These attacks attempt to exploit cookies in order to bypass security mechanisms or send false data to application servers.
随着人工智能(AI)的兴起,机器学习已经开始在检测和阻止这些攻击方面发挥积极作用。
With the rise of artificial intelligence(AI), machine learning is already beginning to play an active role in detecting and stopping these attacks.
同性恋虐待也是一个问题,现在我们已经有了这些攻击和对抗的人跑到球场上。
Homophobic abuse is a problem too, and now we have had these attacks and confrontations from people running on to the pitch.
为避免进一步升级,安全理事会和国际社会必须立即采取行动,毫不含糊地谴责这些攻击。
To avoid a further escalation, the Security Council and the international community must take immediate action, condemning these attacks unequivocally.
这些攻击部队正在渡坦噶尼喀湖,打算入侵布琼布拉省农村南部和鲁蒙格中的布鲁里和马坎巴湖地区。
These attacking forces are crossing Lake Tanganyika to make incursions in the province of southern Bujumbura Rural and parts of Bururi, in Rumonge, and Makamba, in Nyanza-Lac.
The resulting attacks are efficient and low cost: brute-forcing all 8-character lowercase password requires less than 125$in Amazon EC2 instances.
这些攻击是对印度社会及其民主政治进程和法制既定价值观念的挑战。
Those attacks represented a challenge to the established values of its society, to its democratic political process and to its law and order machinery.
这些攻击可能利用恶意Android应用和POS终端,这是攻击者很容易获取和操纵的工具。
Such attacks may leverage malicious Android apps and point-of-sale(POS) terminals, tools that are easy to acquire and manipulate for hackers.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt