• Process seems to be a network worm.

    进程行为网络蠕虫类似

    youdao

  • Code Red "use of Microsoft software in a loophole, is one of the first network worm."

    红色代码利用微软软件中的一个漏洞最早网络蠕虫之一。

    youdao

  • In order to describe Internet worm propagation, a novel subsection model of network worm propagation was put forward.

    为了更好地表达网络蠕虫传播情况,提出一种新的蠕虫传播分段模型

    youdao

  • Because of the huge damage of network worm epidemics, how to detect and response network worms has become an important task in computer network security field.

    由于网络蠕虫泛滥产生巨大危害如何对网络蠕虫进行检测、预警应对已经成为计算机网络安全研究领域一个重要课题

    youdao

  • The result of experiments shows that our adaptive worm detection algorithm can effectively detect the spread of network worms, and has a low false alarm rate and omission rate.

    实验结果表明本文所设计适应蠕虫检测算法能够有效检测网络蠕虫传播具有低的漏报率。

    youdao

  • In order to verify the validity of the algorithm, this paper designed an experimental methods to apply the algorithm through the existing network worm propagation data to verify its effectiveness.

    为了验证上述算法有效性本文设计了一套实验方法通过现有网络蠕虫传播数据归档文件应用算法进行检测来验证有效性

    youdao

  • In the network the sorts of computer virus are various and we can not catch the speed of its renewing.After comparing many kinds of virus, in order to be close to reality, I choose the "Worm."

    当今网络计算机病毒不但种类繁多而且更新速度之快更是令人目不暇接。

    youdao

  • Worm - this type of virus is able to spread itself automatically over the network from one computer to the next.

    蠕虫——病毒可以网络自动计算机传播一台。

    youdao

  • HPOWP provides a good solution for worm prevention in the large-scale and complex network environment.

    模型大规模复杂网络环境中的蠕虫防御提供了好的解决方案

    youdao

  • The diverse propagation way and complex application conditions bring worm eruption in frequency, latency and overcast, therefore the worm does very serious crisis to the network.

    网络环境下,多样化传播途径复杂应用环境使网络蠕虫发生频率增高、潜伏性变强、覆盖面更广,网络造成了极大的危害。

    youdao

  • Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.

    网络通信模型基础上,进一步结合蠕虫传播特征本文提出蠕虫的攻击树模型。

    youdao

  • Network Shield - Provider SettingsNetwork Shield provider protects your computer from Internet worm attacks.

    网络防护保护计算机免遭网络蠕虫侵袭

    youdao

  • Secondly, the worm simulating environment is implemented, and the effects of worm traffic on network are analyzed.

    其次,建立蠕虫模拟环境研究了蠕虫流量网络影响

    youdao

  • In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.

    蠕虫模拟时产生无效ip地址扫描在源节点所属的路由器直接丢弃与实际网络中数据包的传输情况差距较大。

    youdao

  • This method of classification overcomes the shortcomings of the classical one based on worm modeling, which doesn't distinguish the way of network modeling.

    这种分类方式克服了按蠕虫模型分类无法区分网络建模方式缺点

    youdao

  • While the network security defense mechanisms continue to improve, worm also continues to improve its own propagation mechanisms and new worms continue to emerge.

    伴随着网络安全防御机制不断完善蠕虫在不停改善自身传播机制,新的蠕虫不断涌现

    youdao

  • In the network the sorts of computer virus are various and we can not catch the speed of its renewing. After comparing many kinds of virus, in order to be close to reality, I choose the "Worm."

    当今网络计算机病毒不但种类繁多而且更新速度之快更是令人目不暇接。

    youdao

  • In current worm simulation, network simulators will drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.

    蠕虫模拟时产生的无效ip地址扫描源节点所属的路由器直接丢弃与实际网络中数据包的传输情况差距较大。

    youdao

  • The graph-based model of network division is created, an algorithm fit for worm spread restraint is brought forward, and the theoretic analyze and simulations prove the efficiency of this approach.

    建立基于图网络划分模型,并提出适于抑制蠕虫传播的网络划分的算法。

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

  • A worm is a small piece of software that USES computer network and security holes to replicate itself.

    蠕中病毒一种软件,它利用计算机网络安全漏洞进行自我复制。

    youdao

  • The worm significantly slows network connectivity. The most vulnerable systems are those on which trivial or no passwords are in use.

    明显降低网络连接速度,另外没有密码密码简单的电脑容易受到攻击。

    youdao

  • The cooperative design of worm gear over network is realized using ASP components technique, and the 3d worm gear solid image is produced on line.

    通过对asp组件技术运用实现蜗杆零件的网络化协同设计网上在线生成蜗杆实体

    youdao

  • SDNBC is composing of two parts: Network Admission Control sub-system and Worm Detecting sub-system.

    基于客户端的自防御网络系统主要两个子系统组成:网络准入子系统蠕虫检测子系统。

    youdao

  • SDNBC is composing of two parts: Network Admission Control sub-system and Worm Detecting sub-system.

    基于客户端的自防御网络系统主要两个子系统组成:网络准入子系统蠕虫检测子系统。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定