助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   红色代码 在 互联网技术 分类中 的翻译结果: 查询用时:1.247秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
戏剧电影与电视艺术
更多类别查询

图标索引 历史查询
 

红色代码
相关语句
查询“红色代码”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  code red
Aggregate packet count distribution for 24-aggregates before and after Code Red 1 and 2.
      
After Code Red, a much broader range of addresses contact the lab, raising and the aggregate ratio.
      
An ozone code orange or code red is issued during all of these episodes.
      
Also, the sheer magnitude of Code Red would change the address structure by changing the rate at which new addresses enter the system.
      
As it happens, the Code Red worm generates exactly these types of requests when it tries to infect new machines.
      
更多          
  code red
Aggregate packet count distribution for 24-aggregates before and after Code Red 1 and 2.
      
After Code Red, a much broader range of addresses contact the lab, raising and the aggregate ratio.
      
An ozone code orange or code red is issued during all of these episodes.
      
Also, the sheer magnitude of Code Red would change the address structure by changing the rate at which new addresses enter the system.
      
As it happens, the Code Red worm generates exactly these types of requests when it tries to infect new machines.
      
更多          


This paper briefly introduces the spread and harm of RedCode and its namorphosis-RedCode II,III.The typical phenomenon,features and mechanism of the outbreaking of these virus are analyzed and the safe solutions of examining,preventing and getting rid of the virus are elaborated in this paper.

本文简要介绍了红色代码(RedCode)及其变体(RedCodeII,III)的传播、危害、典型现象及其特征,并在此基础上分析论述了其发作机理,最后提出了针对网络端和用户端安全实用的检测、预防及清除的详尽解决方案。

The capture ability of honeypot comes from its number and the distributed places. In the same network topology, by using proper deployment strategy,the number of honeypot and the worm capturing time can both be minimized. Here we discuss the re-search content of honeypot and the scan strategy of the internet worms ,and analyze the principium of RedCode worm, we also estab-lish a honeypot deployment strategy model based on network worm scan strategy.Finally,we validate the honeypot deployment strategy against...

The capture ability of honeypot comes from its number and the distributed places. In the same network topology, by using proper deployment strategy,the number of honeypot and the worm capturing time can both be minimized. Here we discuss the re-search content of honeypot and the scan strategy of the internet worms ,and analyze the principium of RedCode worm, we also estab-lish a honeypot deployment strategy model based on network worm scan strategy.Finally,we validate the honeypot deployment strategy against RedCode worm scan strategy int network simulation environment.

蜜罐的捕获能力来自于其数量和分布位置,在同一网络拓扑中,运用合理的部署策略,可以部署最少的蜜罐,在最短的时间内捕获到蠕虫样本。本文讨论了蜜罐以及蠕虫扫描策略的研究内容,对红色代码蠕虫进行了深入的分析,根据随机扫描扫描策略建立了蜜罐部署策略模型,针对红色代码这种网络蠕虫的扫描策略,在模拟环境下对蜜罐部署策略进行了验证。

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关红色代码的内容
在知识搜索中查有关红色代码的内容
在数字搜索中查有关红色代码的内容
在概念知识元中查有关红色代码的内容
在学术趋势中查有关红色代码的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社