• 概述IE二进制行为组件工作原理根据COM接口原始语义,针对。

    This paper presents the basic principle of IE binary behaviors, and redefines the COM interfaces according to their primary semantics and the feature of .

    youdao

  • 图1给出静态分析二进制代码检查恶意行为图示

    Figure1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour.

    youdao

  • 保证了文件传输应用程序检查附近一个文件的开始数据确定是否文件内容作为文本二进制适当行为

    This ensures proper behaviour of file transfer applications that inspect data near the beginning of a file to determine whether to treat the file's contents as text or as binary.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定