说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 恶意代码防御技术
1.
Research on and Enforcement of Malware-Defending Technology of Secure Operating Systems;
安全操作系统的恶意代码防御技术的研究与实施
2.
Research on Propagation and Defense Technology Against Malicious Code;
计算机恶意代码传播及防御技术研究
3.
Research on Malicious Code Dissemination Mechanism and Technology of Detection and Defense;
恶意代码传播机理及其检测防御技术研究
4.
The Method and Implementation of Active Defense for the Executable Malicious Code;
一种主动防御可执行恶意代码的方法及其实现
5.
Anti-malicious Code Technology Based on SSDT Restoration
基于SSDT恢复的反恶意代码技术
6.
Decoy: A Malware Collection System Based On Active Technology
Decoy:基于主动技术的恶意代码捕获系统
7.
Research and Implementation of Malware Design and Analysis;
恶意代码设计和分析技术的研究与实现
8.
Research on Malicious Code Detection Technology Based on Multi-Level Cooperation
基于多级协同的恶意代码检测技术研究
9.
Research on Malicious Code Detection Technology Based on Monitoring Win32 API Calls
基于Win32 API调用监控的恶意代码检测技术研究
10.
Study and Trends on Client-side Malicious Code of Web Application
Web应用程序客户端恶意代码技术研究与进展
11.
The Study of Malicious Code Detection Based on Data Mining and Machine Learning
基于数据挖掘和机器学习的恶意代码检测技术研究
12.
Theoretical Study of the Strategic Power Infrastructure Defense System Based on Multi-Agent Systems;
基于多代理技术的电力战略防御系统理论研究
13.
In addition, Gu-Zhai-Baos were the application of ancient defense technology in civil society, so they had valve in ancient defense thought and cultural relic protection.
此外,古寨堡是古代军事防御技术在民间的具体应用,对研究古代军事防御思想有一定参考价值;
14.
As a powerful means to protect software, object-code obfuscation can obstruct malicious software analysis effectively.
目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。
15.
Improvement of Firewall Technology to Defensing TCP SYN Flood Attack
防御TCP SYN Flood攻击的防火墙技术改进
16.
Tissue Microarray Technology and Its Preliminary Application in Evaluation of the Expression and Clinical Significance of hBD in the Vocal Cord Polyp;
采用组织芯片技术研究人类β-防御素在声带息肉中的表达及意义
17.
Research on the Technique of Countering Malicious Nodes in Wireless Sensor Networks
无线传感器网络恶意节点防范技术研究
18.
Exploring Multiple Execution Paths for Malware Analysis Based on Coverage of Codes
基于代码覆盖的恶意代码多路径分析方法