Trusted Signature Database (TSD).
可信签名数据库(TSD)。
The genuine signature database is constituted totally by genuine signatures.
真实签名库由真实签名构成。
The technique is attractive because it is adaptive and requires no attack signature database, Evans says.
Evans称,由于它是自适应的,不需要攻击特征数据库,所以该技术很有吸引力。
NAB identifies a few of the programs it catches, but it USES a very small subset of the full Symantec signature database.
NAB也识别了部分它捕捉的程序,但它仅使用了赛门铁克特征数据库的一小部分。
In order to improve the real-time efficiency, a typical set method is introduced to compress the normal signature database.
为了提高安全审计的实时性,引入典型集方法压缩正常行为特征库。
If the suspicious file contains a new malware which is unknown to us at this point in time we will update our signature database.
如果可疑文件是一个我们所不知的新的威胁,在这时我们会及时更新我们的病毒库。
An open signature database for IDS has been implemented in the effort of this paper, which includes more than 1200 effective signatures.
本文的工作实现了一个开放式的网络攻击特征库系统,它包括了1200多条有效的攻击特征。
Since new viruses are created every day, you must keep the antivirus signature database as current as possible to ensure effective scanning.
由于每天都会产生新病毒,您必须尽量使防病毒签名数据库保持为最新,以确保有效的扫描。
Password validation is done by comparing the hash signatures of the password provided by the user with the signature stored in the database.
在检查密码时,会对比用户提供的密码的散列签名和数据库中存储的签名。
Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.
但是,值得牢记的是,许多IPS嗅探器使用基于特征码的检测方法,这意味着当攻击被发现的时候才能被加入到数据库中。
When a user with a mobile phone inputs 15 seconds of music, the system creates a digital signature for that snippet and then looks for a matching pattern in the database.
如果某个行动电话使用者输入15秒的音乐,系统就会为这个音乐片段建立一个数位特征,然后寻找资料库里是否有同样的模式。
In this paper, a relational database based on nested relation is proposed it supports text storage and text operator. The text query is supported by signature file indexing technology.
本文提出的一个嵌套关系模型支持文本存储和文本检索操作,其中特征文件索引为文本检索提供了技术支持。
The system read data from the pool and export worms'signature to the database of signature.
当可疑流量池中的流量超过一定规模时,触发蠕虫特征码自动生成系统。
The system read data from the pool and export worms'signature to the database of signature.
当可疑流量池中的流量超过一定规模时,触发蠕虫特征码自动生成系统。
应用推荐