• 计算机网络攻击防范研究变得越来越重要了。

    The research on attack and defensive of computer network become more and more important.

    youdao

  • 提出基于网络信息熵计算机网络攻击效果定量评估模型

    An attack effect evaluation model of computer network based on network entropy was proposed in this paper.

    youdao

  • 犯罪分子可以利用计算机网络攻击他人计算机系统软件发送垃圾邮件或是窃取资料

    They can be used to attack other systems, host attack tools, send spam, or just steal data.

    youdao

  • 另外一个来自剑桥大学报告同意上述加拿大调查员,认为始于年前几乎所有计算机网络攻击都来自于中国。

    A separate report from Cambridge University agrees with the Canadians that nearly all of the network's cyber attacks, which began two years ago, originate in China.

    youdao

  • 虚拟空间里,这个规则意味着不能规划庞大计算机网络攻击即使是一个军事网络也不能够排除民用网络受到牵连。

    In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.

    youdao

  • 网络内战已经爆发竞争对手间互相攻击对方计算机网络试图揭发泄露对方现实身份

    Cyber civil wars have broken out, with rivals attacking each others' computers and attempting to discover and reveal their real-world identities.

    youdao

  • 无线hub使攻击购物者计算机网络成为更好的选择因为大多数无线hub都禁用安全特性

    Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.

    youdao

  • 克拉克他的同事正在研究云服务如何用于构建僵尸网络的。僵尸网络是由网络攻击控制受感染计算机网络

    Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.

    youdao

  • 社会工程有关计算机通过向天真的问题计算机网络用户信息收集往往计算机网络进行恶意攻击一步

    "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    youdao

  • 总结计算机网络安全问题中的安全技术攻击检测技术作用方法分析了几种典型产品应用

    The essay mainly introduced the safety problem of safety technology, the function and method of attacking test technology in computer network, analyzed the application of several typical product.

    youdao

  • 青少年莫理斯舞有了中心的计算机网络上的帐户攻击给予冗员-使用者状态的地方。

    As a teenager morris had an account on the bell LABS 'computer network where early hacking forays gave him super-user status.

    youdao

  • 攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    youdao

  • 随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统计算机网络面临着来自各方面的威胁攻击

    With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    youdao

  • 通过监测计算机网络计算机系统实现内部攻击外部攻击操作的实时保护,并收集的信息进行分析。

    It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.

    youdao

  • 计算机网络攻击前后安全特性变化角度提出网络概念

    The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.

    youdao

  • 敲诈通过使用妥协蛇神计算机网络参与分布其取消服务攻击那些反对目标网站直到开始支付保护费

    Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.

    youdao

  • 本文主要计算机网络安全概述攻击网络安全的主要技术手段计算机网络安全防范措施方面进行阐述

    This article mainly from the computer work security's outline, the attack work security's major technique method, the computer work safety precaution measure and so on carries on the elaboration.

    youdao

  • 作为一个面向大众开放系统计算机网络面临着来自各方面的威胁攻击

    An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.

    youdao

  • 随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统计算机网络面临着来自各方面的威胁攻击

    With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    youdao

  • 随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统计算机网络面临着来自各方面的威胁攻击

    With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定