1.
Eexamining the Nachi Worm in the LAN With Sniffer;
使用Sniffer检测局域网内Nachi蠕虫病毒
2.
Is it a virus, a worm, a trojan?
“它是病毒,蠕虫还是特洛伊木马?”
3.
Preventing Worm Virus by Using Switch Configuration;
通过交换机设置来抑制蠕虫病毒攻击
4.
Study on Propagation of Worm Virus Based on Cellular Automata
基于元胞自动机的蠕虫病毒传播研究
5.
Early Warning Technology of Network Worm Virus in Campus Network Environment
校园网络环境下网络蠕虫病毒的预警技术
6.
A Methodology of Detecting the Symbian OS Worm Virus Based on Abnormal Behavior
基于行为异常的Symbian OS蠕虫病毒检测方法研究
7.
Simulation of Worm Viruses Spread in Network Based on Cellular Automata
基于元胞自动机的网络蠕虫病毒传播仿真
8.
Prevention and Control of the Warm Viruses in HIS
计算机蠕虫病毒对HIS系统的破坏及防治
9.
The Research of Entrap Worm Virus Based on The Intrusion Detection System
基于入侵检测模型的蠕虫病毒诱捕系统的研究
10.
In Network Security Worm Virus Technology and Guard Measure Research
网络安全中蠕虫病毒技术与防范措施研究
11.
Study of instant messaging worms spreading on complex network
复杂网络中即时通信蠕虫病毒传播的研究
12.
Discussion Computer Virus Crime and Legal Countermeasure--Take the Worm Virus Class as the Angle of View;
试论计算机病毒犯罪及法律对策——以蠕虫病毒类为视角
13.
Is it a virus, a worm, a Trojan, or a backdoor?
判断任何任意的程序是一个病毒、蠕虫、木马,还是后门?
14.
Attackers often use tracking cookies in conjunction with Web bugs.
攻击者使用它来传输病毒,蠕虫和特洛伊木马到用户的工作站。
15.
The fact that laws exist against releasing malicious code does not stop the majority of virus and worm authors from writing them.
现有法律反对发恶意代码实际不能使多数病毒和蠕虫作者停止写。
16.
which means the programs have merged, and the worm is operational, readY for delivery.
也就是说程序已经开发完成 蠕虫病毒准备就绪,就等着传输了
17.
Detection of Unknown Computer Worms Based on the Computer Behavior Using Machine Learning;
基于计算机性能和机器学习的蠕虫病毒检测方法
18.
ON ACTIVE DEFENSE MODE BASED EXTRACTION MODEL OF WORM SIGNATURE CODE AND ITS ALGORITHM DESIGNING
基于主动防御模式下蠕虫病毒特征码的提取模型及算法设计