intrusions
英 [ɪnˈtruːʒənz]
美 [ɪnˈtruʒənz]
n. 侵扰性的事物; 扰乱; 侵犯; 闯入; 侵入
intrusion的复数
柯林斯词典
- N-VAR 打扰;侵扰
If someone disturbs you when you are in a private place or having a private conversation, you can call this event anintrusion.- I hope you don't mind this intrusion, Jon.
乔恩,希望你别介意这次打扰。
- I hope you don't mind this intrusion, Jon.
- N-VAR 干扰;影响
Anintrusionis something that disturbs your mood or your life in a way you do not like.- ...intrusion into private grief...
对个人不幸的搅扰 - I felt it was a grotesque intrusion into our lives.
我感觉那是对我们生活的一种干扰,让人感到荒唐可气。
- ...intrusion into private grief...
双语例句
- Therefore, the intrusions are located in the North China plate tectonically.
因此,该岩带出露区的大地构造位置应归属华北板块。 - In this article, I'll go well beyond installation and configuration, and talk about how to set up Snort to detect Web-related intrusions.
在本文中,我将越过基本的安装和配置知识,讨论如何设置Snort,以检测与Web相关的入侵。 - An incidents-at-sea agreement designed to avoid and manage accidental naval intrusions and contacts should be concluded promptly.
应当迅速缔结一份海上意外事件协定,以避免和处理意外的军舰入侵和接触。 - So for each potentially intrusive connection, Snort needs a rule ( or rules that cover multiple related intrusions).
因此对于每一个可能的入侵连接,Snort都需要使用一条规则(或涵盖多个相关入侵的规则)。 - Having an established and well-informed plan will curtail some of the panic that comes with security intrusions.
拥有确定和周密的计划会减少安全入侵所带来的一些恐慌。 - The hydrothermal fluid in the process of sub-volcanic intrusions is the main ore-forming hydrothermal source.
次火山岩侵入活动过程中的热液,是成矿的主要热液来源。 - Layered intrusions are characterized by a typical layering structure and rhythmic texture.
层状岩体的典型特征是其具有层状构造和韵律结构。 - Neoproterozoic magmatic rocks, especially granitic intrusions, are widespread in the western margin of the Yangtze craton.
扬子地块西缘新元古代岩浆活动非常强烈,花岗岩广布。 - In fact, a series of intrusions into secure systems in the MEA were then traced to China.
事实上,一系列的对外交部安全系统的侵入行为都源自中国。 - In the end, this approach leads to governance and compliance chaos, opening the door to potential data loss as well as malicious intrusions.
最后,这种做法导致治理与合规性的混乱,向潜在的数据丢失以及恶意入侵敞开了大门。