1.
Eexamining the Nachi Worm in the LAN With Sniffer;
![点击朗读](/dictall/images/read.gif)
使用Sniffer检测局域网内Nachi蠕虫病毒
2.
Preventing Worm Virus by Using Switch Configuration;
![点击朗读](/dictall/images/read.gif)
通过交换机设置来抑制蠕虫病毒攻击
3.
Study on Propagation of Worm Virus Based on Cellular Automata
![点击朗读](/dictall/images/read.gif)
基于元胞自动机的蠕虫病毒传播研究
4.
Early Warning Technology of Network Worm Virus in Campus Network Environment
![点击朗读](/dictall/images/read.gif)
校园网络环境下网络蠕虫病毒的预警技术
5.
A Methodology of Detecting the Symbian OS Worm Virus Based on Abnormal Behavior
![点击朗读](/dictall/images/read.gif)
基于行为异常的Symbian OS蠕虫病毒检测方法研究
6.
Simulation of Worm Viruses Spread in Network Based on Cellular Automata
![点击朗读](/dictall/images/read.gif)
基于元胞自动机的网络蠕虫病毒传播仿真
7.
Prevention and Control of the Warm Viruses in HIS
![点击朗读](/dictall/images/read.gif)
计算机蠕虫病毒对HIS系统的破坏及防治
8.
The Research of Entrap Worm Virus Based on The Intrusion Detection System
![点击朗读](/dictall/images/read.gif)
基于入侵检测模型的蠕虫病毒诱捕系统的研究
9.
In Network Security Worm Virus Technology and Guard Measure Research
![点击朗读](/dictall/images/read.gif)
网络安全中蠕虫病毒技术与防范措施研究
10.
Study of instant messaging worms spreading on complex network
![点击朗读](/dictall/images/read.gif)
复杂网络中即时通信蠕虫病毒传播的研究
11.
Discussion Computer Virus Crime and Legal Countermeasure--Take the Worm Virus Class as the Angle of View;
试论计算机病毒犯罪及法律对策——以蠕虫病毒类为视角
12.
which means the programs have merged, and the worm is operational, readY for delivery.
![点击朗读](/dictall/images/read.gif)
也就是说程序已经开发完成 蠕虫病毒准备就绪,就等着传输了
13.
Detection of Unknown Computer Worms Based on the Computer Behavior Using Machine Learning;
基于计算机性能和机器学习的蠕虫病毒检测方法
14.
ON ACTIVE DEFENSE MODE BASED EXTRACTION MODEL OF WORM SIGNATURE CODE AND ITS ALGORITHM DESIGNING
基于主动防御模式下蠕虫病毒特征码的提取模型及算法设计
15.
Is it a virus, a worm, a trojan?
![点击朗读](/dictall/images/read.gif)
“它是病毒,蠕虫还是特洛伊木马?”
16.
Is it a virus, a worm, a Trojan, or a backdoor?
![点击朗读](/dictall/images/read.gif)
判断任何任意的程序是一个病毒、蠕虫、木马,还是后门?
17.
Attackers often use tracking cookies in conjunction with Web bugs.
![点击朗读](/dictall/images/read.gif)
攻击者使用它来传输病毒,蠕虫和特洛伊木马到用户的工作站。
18.
The fact that laws exist against releasing malicious code does not stop the majority of virus and worm authors from writing them.
现有法律反对发恶意代码实际不能使多数病毒和蠕虫作者停止写。