提出了智能手机恶意代码防范模型,并在该模型指导下研究开发了智能手机恶意代码的防范系统。
This paper brings forward such model, and comes up with a prevention system against malicious codes in smart phone under the guidance of this model.
通过对恶意代码机理研究和实践,为恶意代码防范技术研究和网络安全策略研究提供理论基础和指导依据。
The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.
基于进程行为的入侵检测技术是主机防范入侵和检测恶意代码的重要技术手段之一。
Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.
用于序列化的特殊构造函数也应当进行彻底的输入验证,并且应当成为被保护的或者私有的,以帮助防范恶意代码的滥用行为。
The special constructor used for serialization should also perform thorough input validation and should be either protected or private to help protect against misuse by malicious code.
主要研究方向:信息安全,软件漏洞分析与检测,恶意代码分析与防范。
Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.
无论在何种情况下,都应采取防范措施以防止导入恶意代码或对ide和承载组件的服务器产生意外但有负面影响的代码。
In all cases, you should take precautions against importing malicious code or code that has unintentional but undesirable impact on your IDE and the server hosting the components.
无论在何种情况下,都应采取防范措施以防止导入恶意代码或对ide和承载组件的服务器产生意外但有负面影响的代码。
In all cases, you should take precautions against importing malicious code or code that has unintentional but undesirable impact on your IDE and the server hosting the components.
应用推荐