助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   含有恶意的 的翻译结果: 查询用时:0.484秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

含有恶意的
相关语句
  相似匹配句对
     Chromium-containing phosphate
     铬的磷酸盐
短句来源
     MOLYBDENUM-CONTAINING LUBRICATION MATERIALS
     钼润滑材料
短句来源
     With the development of network technology, the digital products transmitted through the Internet are easier to be modified or copied by vicious people at will without authorization.
     网络技术的发展使得网络传输的数字产品在没有授权的情况下容易被有恶意的人们随意篡改、拷贝。
短句来源
     But, with the side effect, there is despiteful individual or organization being copy, tamper and broadcasting the copyright content, without admission of the work owner.
     但随之而来的副作用是,有恶意的个人或团体可能在没有得到作品所有者的许可下,随意复制、篡改和传播有版权的内容。
短句来源
     However, some spiteful individual and group copy and transmit the copyright document by spreading data in network without the permission.
     但是通过网络传播数据也使有恶意的个人或团体在没有得到数据文件所有者许可的情况下能肆意地复制和传播有版权保护的文档。
短句来源
查询“含有恶意的”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  malevolent
For the most general, so-called byzantine, failures that lie in an arbitrary, "malevolent" behavior of the faulty computer, a method of distributed system diagnosis was proposed.
      
Student-teachers judged descriptions of behavior of ten year old pupils in respect to intensity of aggressive-malevolent behavior.
      
I argue, first, that Trakakis errs in his implicit assertion that my argument relies upon our being strongly malevolent by nature.
      
I argue, second, that Trakakis errs in thinking that our being weakly benevolent, morally bivalent, or weakly malevolent by nature is sufficient to refute my critique of the traditional freewill theodicy.
      
It is an ethical dilemma for the researcher because of the potential actions of others, e.g., malevolent non-researchers who might steal dangerous biological agents, or make use of the original researcher's work.
      
更多          


As the attacking technology is developing,the security of networks is faced with more and more severe challenge and it is not sure that the operating file or running program has malicious code.How to find and remove the Trojan program is very important to ensure the information security,but many software just can detect known Trojan horse.From analysis and inducement of the current Trojan horse detection technologies,this paper designs and implements a very efficient Trojan horse detection system based on Windows...

As the attacking technology is developing,the security of networks is faced with more and more severe challenge and it is not sure that the operating file or running program has malicious code.How to find and remove the Trojan program is very important to ensure the information security,but many software just can detect known Trojan horse.From analysis and inducement of the current Trojan horse detection technologies,this paper designs and implements a very efficient Trojan horse detection system based on Windows to detect known Trojan horse and learn from preventing unknown Trojan horse to enhance the detection ability.

随着黑客攻击技术的不断进步,网络安全面临越来越严重的威胁。由于不能确保系统不被黑客攻击,也无法确定用户操作的文件或程序是否含有恶意的代码,因而,及时发现系统中存在的木马程序或者含有恶意代码的文件,是确保系统信息安全的重要途径。目前的许多木马检测软件仅能对已知的木马进行检测,对未知木马却无可奈何。文章在分析和综合当前木马检测技术的基础上,设计并实现了一个在Windows系统中行之有效的木马检测系统,不仅能有效检测已知的木马,还能对未知的木马进行有效的预防,通过对未知木马的特征进行自主式学习,并应用于检测,从而提高木马检测的功能。

Installing intercept one of the principles of software testing is Tezhengma hidden documents, namely the procedures and some segments of the pre-sampling data showing comparisons to judge a document was not contain malicious code. If we can identify in their own software Tezhengma host and appropriate deformation, the code can be improved to some extent concealed. Tezhengma find common method is a case-by-byte replacement law, namely a case-by-byte (or paragraph by paragraph) code for the replacement of 0000...

Installing intercept one of the principles of software testing is Tezhengma hidden documents, namely the procedures and some segments of the pre-sampling data showing comparisons to judge a document was not contain malicious code. If we can identify in their own software Tezhengma host and appropriate deformation, the code can be improved to some extent concealed. Tezhengma find common method is a case-by-byte replacement law, namely a case-by-byte (or paragraph by paragraph) code for the replacement of 0000 (or other), if such replacement after installing software without alerting interception on Tezhengma has been replaced, the replaced Tezhengma location. To improve the efficiency of document positioning, we analysed documents Tezhengma positioning technology research, which made use of this principle, the code will replace the procedures for 0000, under which the final document was generated and what not to delete positioning Tezhengma position.

查杀拦截软件检测隐藏文件的原理之一是特征码,也就是将程序的片段和一些预先采样的数据片段进行比较来判断一个文件是不是含有恶意代码。如果能在自已的软件中找出特征码的所在,并进行适当的变形,便能一定程度上提高代码的隐蔽性。常用的寻找特征码的方法,是逐字节替换法,也即逐字节(或逐段)将代码替换为0000(或者别的),如果进行替换后查杀拦截等软件没有报警,说明特征码已被替换掉,即特征码在该被替换的位置。为了提高文件定位的效率,我们对文件特征码的定位技术作了分析研究,它利用了上述原理,将程序中的代码替换为0000,最后根据哪些生成文件被删除而哪些没有来定位特征码的位置。

More and more network security applications depend on inspecting the content of the packets to detect the malicious attacks. To detect these attacks online, packet inspection demands exceptionally high performance. A lot of research works have been done in this field, and yet there is still significant room for improvement in throughput and scalability. This paper proposes a fast packet inspection algorithm based on state-based Bloom filter engines (SABFE). To achieve high throughput, parallel design is adopted...

More and more network security applications depend on inspecting the content of the packets to detect the malicious attacks. To detect these attacks online, packet inspection demands exceptionally high performance. A lot of research works have been done in this field, and yet there is still significant room for improvement in throughput and scalability. This paper proposes a fast packet inspection algorithm based on state-based Bloom filter engines (SABFE). To achieve high throughput, parallel design is adopted when searching in one Bloom filter engine and between multiple Bloom filter engines. In addition, specific lookup table and prefix register heap are constructed in SABFE to keep the state of the matched prefix for the sake of detecting long patterns. The analysis and the evaluation show that the high throughput of the algorithm can satisfy the wire speed detection requirement when the low resource consumption in hardware resource further improves the scalability of SABFE.

越来越多的网络安全技术通过分析网络分组中的内容来检测报文中是否含有恶意攻击代码.为了能够在线检测攻击,部署在路由器中的分组检测模块对于分组检测的速度也提出了越来越高的要求.虽然在这个领域已有很多研究工作,然而在性能、可扩展性和适用性方面还有很多可研究的空间.提出了一种基于有状态Bloomfilter引擎的高速分组检测方法State-BasedBloomfilterengine(SABFE).通过并行查找Bloomfilter和前缀寄存器堆,以及利用多个并行的Bloomfilter引擎进行流并行检测,达到了较高的吞吐性能.同时,利用快速查找表和前缀寄存器堆保存当前子串的匹配状态来检测长的规则.分析和模拟实验表明:该方法在规则长度增加时依然保持了较高的吞吐性能,可以实现线速的分组检测,同时,极大地减少了硬件资源开销,提高了可扩展性.

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关含有恶意的的内容
在知识搜索中查有关含有恶意的的内容
在数字搜索中查有关含有恶意的的内容
在概念知识元中查有关含有恶意的的内容
在学术趋势中查有关含有恶意的的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社