说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 可执行恶意代码
1.
The Method and Implementation of Active Defense for the Executable Malicious Code;
一种主动防御可执行恶意代码的方法及其实现
2.
Research and Implement to Detect Unknown Malicious Executive Code with Net Classifier Based on Active Learning Bayesian;
基于主动贝叶斯分类器检测未知恶意可执行代码的研究与实现
3.
There is no executable code at this location in the source code.
源代码的此位置没有可执行代码。
4.
Fix for stack overflow vulnerability which could allow arbitrary code execution.
修复了一个可能导致执行任意代码的缓冲区溢出漏洞。
5.
Code files simply exist as files, modules, and executable scripts.
代码文件只是文件,模块,和可执行脚本。
6.
In addition, code access security ensures that only trusted code can perform certain tasks, no matter who runs the code.
此外,代码访问安全可以确保只有安全的代码才可以执行某些操作。
7.
A Malicious Code Detection Method Based on Integrated Behavior Characterization
一种基于综合行为特征的恶意代码识别方法
8.
Comparison between two statistics of a malicious code behavior feature
2种恶意代码行为特征统计方法的比较
9.
use a computer program to translate source code written in a particular programming language into computer-readable machine code that can be executed.
用计算机程序翻译可以执行的原始代码。
10.
Research on Code-coverage Technology of Binary Executable File;
基于二进制可执行文件代码覆盖测试技术研究
11.
A static memory leak detection method for binary programs
一种针对可执行代码的内存泄漏静态分析方案
12.
An executable examining project and method of cleaning viciousness code are presented.
对于恶意代码提出了可实施的检测系统方案和删除的方法。
13.
Figure1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour.
图1给出静态分析二进制代码检查恶意行为的图示。
14.
Exploring Multiple Execution Paths for Malware Analysis Based on Coverage of Codes
基于代码覆盖的恶意代码多路径分析方法
15.
The switch statement selects from among pieces of code based on the value of an integral expression.
根据一个整数表达式的值,switch语句可从一系列代码选出一段执行。
16.
These viruses infect executable code found in certain system areas on a disk.
这些病毒感染可执行代码发现,在某些地区,系统对一个磁盘。
17.
An Event Handler is a subroutine that executes code for a given event.
事件处理器为一个子程序,它可以为指定的事件执行相应代码。
18.
Research on Propagation and Defense Technology Against Malicious Code;
计算机恶意代码传播及防御技术研究