• Run-time malware detection strategies are efficient and robust, which get more and more attention.

    运行时恶意软件检测策略有效的强大的越来越多的关注。

    youdao

  • The "Protection" covers static and dynamic malware detection, including real-world 0-day attack testing.

    防护包括静态动态恶意软件检测,涵盖了零日漏洞攻击测试

    youdao

  • Identify changes to security policy, software configurations, and the addition of malware detection and prevention controls.

    认定安全策略软件配置恶意软件检测防御控制改变

    youdao

  • That helps with malware detection because a virus built for one operating system may not be clever enough to hide from another OS.

    这种方式有助于检测恶意软件。因为针对某种操作系统编制的恶意软件还没有“聪明”另一种操作系统中也做到隐身不见

    youdao

  • This paper proposes a semantics-based framework of malware detection for detecting whether a program is a variation of the malware.

    最后,通过一个实现了该框架原型系统来说明基于语义恶意软件判定器框架的可行性。

    youdao

  • Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    恶意代码检测技术主要分为基于主机基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。

    youdao

  • Grosse: I agree that regulations that would talk about intrusion detection or malware detection or deep pack-et inspection on the network really are being passed by with current technology trends.

    Grosse确实,那些谈论网络中的入侵检测恶意软件检测深度检测法规正逐渐当前技术潮流所忽略。

    youdao

  • This means that malware can avoid detection simply by delaying performing any malicious actions.

    意味着恶意软件可以简单地通过延迟表现所有可疑动作来规避检测

    youdao

  • Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.

    主要研究方向信息安全软件漏洞分析检测恶意代码分析与防范

    youdao

  • This model is used as a basis for a detection algorithm which is automatically enhanced and updated with new malware samples submitted by our users to our servers.

    应用模型以此为基础一个检测算法自动升级更新新的恶意软件样品提交用户我们服务器上

    youdao

  • When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    youdao

  • When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定