• Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍地都认识不清。

    youdao

  • Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.

    基于网络攻击这些攻击依赖于对网络数据包低层访问试图通过修改通信流或者发现这些数据包中的信息危害系统

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • These defenses effectively stop any attacks based on the parser making external network connections.

    这些防御措施有效地阻止了基于解析器创建外部网络连接所有攻击

    youdao

  • We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.

    我们建议,在造访地球先给自己网路设上密码并且请安装使用人类安全软件预防计算机攻击

    youdao

  • As well as the social network site-based attacks will increase, causing more infections.

    以网站以及社会网络为基础攻击将会增多引起更多感染

    youdao

  • To enhance the ability of defending attacks such as rotation and cropping, an algorithm based on wavelet moment modulation and neural network detection was presented.

    提高抵抗旋转剪切攻击能力,提出了基于小波特征调制神经网检测的图像水印算法。

    youdao

  • The key idea is to take advantage of classification abilities of neural network for unknown attacks and the rule-based system for the known attacks.

    主要思想利用神经网络分类能力识别未知攻击使用基于规则系统识别已知攻击。

    youdao

  • For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.

    对于当前混合型攻击层出不穷安全威胁传统基于单一设备网络安全防护技术己显得无能为力了

    youdao

  • However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.

    但是这种基于识别主机完整性信息网络用户行为管理技术不能识别出具有绕主机完整性检查攻击行为

    youdao

  • The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.

    基于地址欺骗网络攻击成为当前网络安全主要威胁之一。

    youdao

  • Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.

    分析影响服务可用性网络攻击导致网络流量异常改变基础,提出了一种主机网络实时流量安全状况评估方法

    youdao

  • Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.

    分析影响服务可用性网络攻击导致网络流量异常改变基础,提出了一种主机网络实时流量安全状况评估方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定