说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 隐蔽窃听
1)  covert tapping
隐蔽窃听
1.
Two factors affecting covert tapping are first investigated by deducing the fiber bending loss formula.
文章首先通过推导弯曲损耗系数的理论公式,分别考察了弯曲窃听的两类影响因素;然后在此基础上设计了窃听系统框架结构,搭建了光纤窃听实验系统,实现了隐蔽窃听,而且得到了实现弯曲窃听的最佳弯曲半径;最后,针对该隐蔽窃听的特征并利用相同条件下长波长弯曲损耗比正常的通信波长大得多的特点,提出了灵敏度更高的有效窃听监测方法。
2)  eavesdropping [英]['i:vz,drɔpiŋ]  [美]['ivz,drɑpɪŋ]
窃听、窃取
3)  eavesdropping [英]['i:vz,drɔpiŋ]  [美]['ivz,drɑpɪŋ]
窃听
1.
Random network coding against the eavesdropping adversaries
一种防窃听的随机网络编码
2.
This paper analyses of the submarine optical fible cable signals eavesdropping technology channels,discussed the waters of China′s submarine fiber optic cable for wiretap method,the United States nuclearpowered attack submarines" Jimmy·Carter,"the eavesdropping undersea fiber optic cable capacity.
分析了对海底光缆中的光信号进行窃听的技术途径,讨论对我国海域海光缆进行窃听的方法,研究了美国核动力攻击潜艇"吉米。
4)  tapping [英][tæp]  [美][tæp]
窃听
1.
Based on optical fiber-bending radiation,four steps method for optical cable tapping,bending the optical fiber,collecting optical signals and demodulating information are proposed.
基于光纤弯曲辐射,提出了四步光缆窃听法,即"剥光缆,弯光纤,取信号,解信息"。
2.
By analyzing Four Wave Mixing (FWM) theory, we propose a new tapping and attacking method by virtue of ROADM.
在分析四波混频理论的基础上,提出了借助可重构光分插复用器、基于四波混频效应实施光信道窃听和攻击的方法;仿真了对光信道窃听的可行性,并进行了攻击试验,这种攻击可导致通信系统服务质量明显下降,甚至出现服务拒绝。
3.
In order to collect the information about the terrorism,the American government approved the" Patriot Act" and thus enlarged swiftly the power of the government for tapping and wiretap surveillance,which has been doubted by the public,but in the subsequent years,the American government still takes a series of measures to strengthen the surveillance procedure.
为了加强对恐怖主义的情报收集,美国政府通过《爱国者法》迅速扩大政府窃听及电讯监视的权力。
5)  eavesdrop [英]['i:vzdrɔp]  [美]['ivz'drɑp]
窃听
1.
The works are as follows:1、Proposed a framework for security analysis, pointed out the parameters which related to security in address codes, analysed the securiyt performance from the perspective of two common eavesdropping methods, deduced the time eavesdropper required when taped single-signals from multiple users and the ability to tap a single user and multiple users.
完成的主要工作如下:(1)介绍了OCDMA安全性能分析的模型,指出了地址码中和安全性有关的几个参数,从两种常见窃听方式的角度定量分析了安全性能,推导出了窃听者从多个用户信号中窃听到单用户信号所需的时间,以及窃听单个用户和多个用户的能力。
6)  wiretap [英]['waiə,tæp]  [美]['waɪr,tæp]
窃听
1.
Then it analyzes the wiretap and RTP injection attack.
文中介绍了基于SIP的VoIP系统中有关RTP的攻击,通过协议与报文分析,深入分析并实现了窃听攻击与RTP注入攻击,证明了这两种协议存在安全漏洞,最后提出了防范这些攻击的方案,为提高VoIP系统的安全性提供了参考。
补充资料:非法使用窃听、窃照专用器材罪
非法使用窃听、窃照专用器材罪:指违反法律规定,使用窃听、窃照专用器材,造成严重后果的行为。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条