Cannot carry on the malicious attack to it with to slander.
不能对其进行恶意攻击与诋毁。
Recommender System; Collaborative Filtering; User Trust; Malicious Attack; Similarity.
推荐系统;协同过滤;用户信任;恶意攻击;相似性。
Multiple origin AS conflicts may result from multi-homing, misconfiguration or malicious attack.
多源AS冲突可能起源于多宿主,如配置错误或者恶意攻击等。
And while they said they had no reported cases so far of "malicious attack," they warned it is possible.
他们称虽然目前没有此类恶性事件发生的报道,但这是可能的。
McAfee has a product called McAfee Secure which helps corporations determine whether their sites are open to malicious attack.
McAfee有一个叫做McAfee安全(Secure)的产品,用来帮助公司确认自己的网站是否会受到恶意攻击。
In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.
在恶意攻击语句中,SQL注入和中间件通道复用两种攻击是难中难,同时也是重中重。
The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.
模拟实验表明TVCA算法在提高计算效率、抵抗恶意攻击等方面都能取得良好的效果。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Skype has no evidence to suggest that this was a malicious attack. We've identified a bug in the Skype software which was the root cause of the downtime.
一个发言人排除了这是一次破坏行为的可能性,Skype没有证据显示这是一次蓄意的攻击,相反,我们在Skype的软件中发现了一个bug,该bug是导致此次全球宕机的根源。
Securing Web services with ACLs, however, does not mitigate the risk of exposing Web services (and non-Web services) vulnerabilities to a malicious attack.
用访问控制表保护Web服务,然而,这并不能减轻Web服务(以及非web服务)漏洞受到恶意攻击的危险。
Regarding goods price and business information users may judge by themselves. any malicious attack on asking price and offering price is strictly prohibited.
对于交易价格以及商品等各类信息,请网友自行判断。严禁恶意攻击卖家的开价和买家的出价以及对于商品的诋毁。
Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.
介绍软件抗篡改是编写程序的艺术,使代码在没有攻击检测的情况下,不会被潜在的有恶意的攻击代码所修改。
Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.
自动下线是保护到给定系统(通常但并不必须是远程的)的休眠会话不被恶意利用,帮助降低受到恶意攻击的风险。
The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.
利用该模型可以在两个对等实体之间建立高效、可靠的信任关系,有效防止恶意攻击,提高P 2 P网络的效率和安全。
"Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.
“社会工程”的有关计算机或通过向天真的问题,计算机网络用户的信息收集,往往是在计算机网络上进行恶意攻击的第一步。
Anti-virus software plays one, albeit important, part in the defense of your company from malicious attack but the security of your computer system is only as strong as the weakest link.
反病毒软件虽然可以在对你的电脑起到防御作用,使其不受恶意攻击,但是你的电脑系统的安全却仍然是很薄弱的环节。
Knowing that the cause is a malicious attack does take Twitter off the hook to some degree –it may have been assumed that the site was simply failing to scale properly, as had happened in the past.
当人们得知twitter宕机的原因是缘于恶意袭击,Twitter才得以从困境中缓过气来 -人们原本推测Twitter宕机的原因是twitter不能承受如此规模的服务器负担,而这种情况在以前就发生过的。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Tencent said it was defending itself against a malicious software attack, but the move triggered accusations that Tencent had too much power.
腾讯表示这么做是针对恶意软件攻击的防御举措,但此举引发大量指责,称腾讯权势过大。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
Replay attack — Re-sending a previously valid message for malicious effect, possibly where only parts of the message (such as the security token) are replayed.
应答攻击——为实现恶意的效果,重新发送一个以前曾经有效的消息,其中可能只是重放部分消息(如安全令牌)。
As mentioned above, a replay attack by some malicious third party is the most convenient attack.
正如上文所提到的,来自某个恶意第三方的再现攻击是最容易遭受到的攻击。
Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).
由于攻击者通常是试图添加恶意的脚本,因些这种变化被称为“交叉站点脚本攻击” (XSS攻击)。
For years, security analysts had warned that industrial control systems were susceptible to attack or manipulation by malicious coders.
多年以来,安全分析家们就做出警示:工业控制系统很容易遭到那些恶意的程序员的攻击和操控。
In other words, in spite of the fact that the women realized malicious gossip wasn't socially appropriate, this was nevertheless their preferred first point of attack.
也就是说,虽然妇女意识到恶毒的闲话不适应社会性,但这仍然是她们首选的攻击点。
It should address mitigating risks of SaaS applications that are vulnerable to an attack by a malware application that allocates malicious instance resources.
黑客可能通过分配恶意实例资源的恶意软件攻击SaaS应用程序,策略应该降低这种风险。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
应用推荐