去查网 logo

Worm

中文翻译蠕虫〖病毒〗

同义词释义

    1)Worm,蠕虫〖病毒〗2)worm,蠕虫病毒3)worm virus,蠕虫病毒4)worms,蠕虫病毒5)the Nachi worm virus,Nachi蠕虫病毒6)IM worm virus,IM蠕虫病毒

用法例句

    The threats caused by IM worms were analyzed,the solutions in existing applications and studies were analyzed and their strong points were made use of.

    对IM面临的来自蠕虫病毒的威胁进行分析,并对现有应用、研究工作中的解决方案进行分析,借鉴其中的成功点,提出一套IM系统中蠕虫病毒的防范策略,引入PKI机制,利用CAPTCHA等技术,通过签名、验证签名、CAPTCHA验证和IM消息流量监控等方法,确保IM消息的有效性,防范IM蠕虫病毒攻击、减轻其带来的威胁。

    Based on the traditional theory of IDS,the system entropy is studied,which come from statistics model,combining the worm behaviors characteristic the exponent entropy conception is put forward,a new inhibiting method is proposed from the anomaly detection point of view.

    在传统的入侵检测理论的基础上,研究了统计学概念模型系统熵,并结合蠕虫病毒的行为特征提出了指数熵概念,从异常检测的角度对蠕虫病毒采取了一种新型扼制方法。

    This paper, based on analysis of distributed abnormal traffic sequence propagation, presents a new algorithm for detecting the Internet worm infection, and explores the forecast mechanism for worm traffic.

    分析了网络蠕虫病毒的传播特点和已有的检测方法,针对慢速传播蠕虫病毒,提出了基于流量异常传播序列的检测算法,并通过分布式系统结构,综合多个子网的检测结果,进一步提高检测准确率。

    Research on worm virus flow in LAN

    局域网中蠕虫病毒流量的研究

    In light of the characteristics of the LAN in Laiwu Steel Group,based on a brief analysis of the characteristics of worm virus,its spreading approaches and outbreak features,this paper puts forward safeguarding measures against worm virus off enterprise LAN.

    结合莱钢局域网的特点,简要分析了蠕虫病毒特点、传播途径和发作特征,提出企业局域网蠕虫病毒防范措施,并在莱钢得以有效实施。

    An Analysis of Conventional Attacking Schemes by Worms;

    蠕虫病毒的常规攻击手法分析

    Along with the spreading of Internet applications,the threat caused by network worms is increasing.

    首先给出了蠕虫病毒的定义,讨论了计算机蠕虫病毒和传统病毒的联系和区别,利用网络陷阱技术对蠕虫病毒进行了剖析,为反蠕虫策略提供了依据。

    During leak scanning, worms will bring huge payload and lead to inability of the whole network.

    在扫描漏洞主机的过程中,蠕虫病毒会产生巨大的网络流量,导致整个网络瘫痪,造成经济损失。

    This paper gives the function of Sniffer Pro,the character of the Nachi worm virus and the affection about the computer network.

     介绍了SnifferPro功能,Nachi蠕虫病毒的特征及对计算机网络的影响。

    According to the CAPTCHA IM worms killing technology, improves the IM worm virus immunization strategy, puts forward a Timing model of CAPTCHA, evaluates the reliability of communication networks in different measurement methods, analyzes invulnerability of three IM communication networks using association graph and analytic hierarchy process qualitatively and quantitatively.

    在对复杂网络抗毁性问题相关技术分析的基础上,从网络拓扑结构的一般属性出发,阐述复杂网络拓扑特性及形成机制,研究了复杂网络各种特性对抗毁性的影响;通过对复杂网络即时通信蠕虫病毒传播的研究,建立IM蠕虫病毒群体的生灭模型,探讨IM蠕虫病毒传播规律,并基于CAPTCHA的IM蠕虫扼杀技术进一步改进IM蠕虫病毒免疫策略,提出一个挑战信息使用时机模型;在评价针对通信网可靠性的不同测度方法的基础上,使用关联图-层次分析法定性,定量的分析了3个即时通信网络的抗毁性。

    Eexamining the Nachi Worm in the LAN With Sniffer;

    使用Sniffer检测局域网内Nachi蠕虫病毒

    Preventing Worm Virus by Using Switch Configuration;

    通过交换机设置来抑制蠕虫病毒攻击

    Study on Propagation of Worm Virus Based on Cellular Automata

    基于元胞自动机的蠕虫病毒传播研究

    Early Warning Technology of Network Worm Virus in Campus Network Environment

    校园网络环境下网络蠕虫病毒的预警技术

    A Methodology of Detecting the Symbian OS Worm Virus Based on Abnormal Behavior

    基于行为异常的Symbian OS蠕虫病毒检测方法研究

    Simulation of Worm Viruses Spread in Network Based on Cellular Automata

    基于元胞自动机的网络蠕虫病毒传播仿真

    Prevention and Control of the Warm Viruses in HIS

    计算机蠕虫病毒对HIS系统的破坏及防治

    The Research of Entrap Worm Virus Based on The Intrusion Detection System

    基于入侵检测模型的蠕虫病毒诱捕系统的研究

    In Network Security Worm Virus Technology and Guard Measure Research

    网络安全中蠕虫病毒技术与防范措施研究

    Study of instant messaging worms spreading on complex network

    复杂网络中即时通信蠕虫病毒传播的研究

    Discussion Computer Virus Crime and Legal Countermeasure--Take the Worm Virus Class as the Angle of View;

    试论计算机病毒犯罪及法律对策——以蠕虫病毒类为视角

    which means the programs have merged, and the worm is operational, readY for delivery.

    也就是说程序已经开发完成 蠕虫病毒准备就绪,就等着传输了

    Detection of Unknown Computer Worms Based on the Computer Behavior Using Machine Learning;

    基于计算机性能和机器学习的蠕虫病毒检测方法

    ON ACTIVE DEFENSE MODE BASED EXTRACTION MODEL OF WORM SIGNATURE CODE AND ITS ALGORITHM DESIGNING

    基于主动防御模式下蠕虫病毒特征码的提取模型及算法设计

    Is it a virus, a worm, a trojan?

    “它是病毒,蠕虫还是特洛伊木马?”

    Is it a virus, a worm, a Trojan, or a backdoor?

    判断任何任意的程序是一个病毒、蠕虫、木马,还是后门?

    Attackers often use tracking cookies in conjunction with Web bugs.

    攻击者使用它来传输病毒,蠕虫和特洛伊木马到用户的工作站。

    The fact that laws exist against releasing malicious code does not stop the majority of virus and worm authors from writing them.

    现有法律反对发恶意代码实际不能使多数病毒和蠕虫作者停止写。

全部查询工具

关于我们免责声明联系我们网站地图最近更新

免责说明:本站为非营利性网站,本站内容全部由《去查网》从互联网搜集编辑整理而成,版权归原作者所有,如有冒犯,请联系我们删除。

Copyright © 2020 - 2024 quchaw.com All rights reserved.浙ICP备20019715号