1.
Research on Malware Propagation in Wireless Environment
无线环境下恶意程序的传播机制研究
2.
A Methodology to Detect Malware Based on NDIS
基于NDIS的恶意程序通信隐藏检测方法
3.
Malware propagation model in bluetooth networks
一种蓝牙环境下恶意程序的传播模型
4.
This is a measure of how well current antivirus technology can keep this threat from spreading.
这测量了当前的反病毒技术能多好的阻止这恶意程序的传播。
5.
On Regulating Malicious Litigations Initiated by Persons Other than Those Involved in a CaseThrough Procedural Law;
论诈害案外人恶意诉讼之程序法规制
6.
Many spyware/ malware programs use filenames of usual, non-malware programs.
许多间谍/意程序通常使用的文件名,非恶意节目.
7.
Abuse of process is a act of suing someone in bad faith or without proper justification or formalicious reasons.
滥用诉讼程序(恶意地,在没有合适司法程序情况下或带恶意地起诉某人)
8.
This a wer is then tra lated into whether the program contai malicious behaviour.
这个答案然后被转化成程序是否含有恶意行为。
9.
Study and Trends on Client-side Malicious Code of Web Application
Web应用程序客户端恶意代码技术研究与进展
10.
When there is a deliberate choice to restrict, the harmful consequences are deliberate destruction.
假如可以故意选择限制程序的使用,其恶果就是任意地破坏。
11.
The harmfulness and its measurement and evaluation method of malicious network program are thoroughly analyzed.
对恶意网络程序的危害性及其度量评估方法进行了深入分析研究。
12.
Script virus and technology of monitoring registry table based on API HOOK
恶意脚本程序研究以及基于API HOOK的注册表监控技术
13.
From the implementation model-necessarily the programmer’s point of view-such gentle, innocent probing represents a continuous series of “mistakes.”
从实现模型看——程序员必然的看法——这种温和而没有恶意的探索代表着一系列的“错误”。
14.
audit procedures relating to contingencies
意外支出的审计程序
15.
prior informed consent procedure
事先知情的同意程序
16.
a routine designed to yield a random number.
产生任意数字的程序。
17.
Ten Noticed Matters about Authorware Program Pack;
Authorware程序打包十注意
18.
Malware Detection Based on Sequential Pattern Mining Algorithms
基于序列模式挖掘算法的恶意代码检测