Exemples d'utilisation de Vulnerable to attack en Anglais et leurs traductions en Français
{-}
-
Official
-
Colloquial
the very existence of nuclear weapons and fissile materials made the world more vulnerable to attack by non-State actors.
and as such, they are vulnerable to attack, hostage-taking and harassment.
They are somewhat vulnerable to attack by lowering the temperature of the system,
Vulnerable to attack by enemy fighters,
Aid workers accompanied by armed escorts provided by the Government are vulnerable to attack by anti-Government armed groups,
Very old ash trees are especially vulnerable to attack by these beetles and may serve as focal points for outbreaks that then spread to healthy trees.
As airlift to Mogadishu airport is both expensive and vulnerable to attack, UNSOA emphasis will shift towards bulk sea movements for consignments of equipment and supplies, as well as troop contingents.
the trebuchet itself is vulnerable to attack, but with this powerful new weapon in the arsenal of the attackers, base builders may
girls become highly vulnerable to attack, rape and kidnapping because of insecure routes to both water sources and private places for defecation.
Circle of Life also has a relatively long cast time-- meaning that you will be vulnerable to attack while you're attempting your rescue-- and you can't do it very often.
which were vulnerable to attack, and clandestine teams in exposed locations.
location which would render it vulnerable to attack, and must not be used for military purposes.
believed capturing the islands would outflank Russian defences and lay Petrograd(St. Petersburg) vulnerable to attack.
19th centuries the region around Beaufort was highly vulnerable to attack.
with supply lines greatly vulnerable to attack.
the administrative centre of the Croatian Serbs, vulnerable to attack from three sides.
your online accounts can become vulnerable to attack if you reuse passwords
it is important to note that the virus is vulnerable to attack by proteolytic enzymes,
entire sections of the ship are vulnerable to attack.
applications on a regular basis makes systems vulnerable to attack.